Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is The Damage of a Cyber Attack? Marks & Spencers Breach Review

When dealing with a cyber attack, the specter of a cyber attack looms large over corporations, with potential repercussions that can ravage both finances and consumer trust. The recent assault on retail giant Marks & Spencer by the notorious hacking group Scattered Spider demonstrates the profound vulnerabilities at stake. Understanding the breadth of such a cyber attack is crucial not only for recovering affected businesses but also for safeguarding future operations.

Effective Communication in InfoSec: More Than Just Technical Skills

By James Rees, MD, Razorthorn Security Communication is an essential element in every aspect of modern society. It underpins how we share ideas, manage difficult situations and advance our careers. In the information security sector, effective communication isn’t merely beneficial – it’s absolutely crucial. While technical competencies remain foundational, the ability to communicate clearly and effectively often determines success.

LockBit Ransomware Gang Breached, Secrets Exposed

Oh dear, what a shame, never mind. Yes, it's hard to feel too much sympathy when a group of cybercriminals who have themselves extorted millions of dollars from innocent victims have found themselves dealing with their own cybersecurity problem. And that's just what has happened to the notorious LockBit ransomware gang, which has been given a taste of its own medicine.

Free vs. Paid WAFs in 2025: What Your Business Needs to Stay Secure

Are you relying on free WAFs to keep your business safe? While they might seem like an easy, budget-friendly option, can they really protect you from sophisticated cyber threats like SQL injections, XSS, and bot attacks? Or are you missing critical layers of defense as your business scales? In this guide, we’ll answer these questions and more, comparing free and paid WAFs to help you understand the risks, features, and real-world implications of each.

Best practices for automating third-party vendor assessments: A leadership perspective

Enterprises increasingly rely on third-party vendors to support critical operations, drive innovation, and provide essential services. However, as organizations expand their supplier networks, the complexities and challenges in ensuring vendor reliability—especially in terms of compliance, security, and operational excellence—have also grown. For leadership teams, automating vendor assessments is no longer a luxury but an operational necessity.

Cybersecurity Consulting and Ransomware Updates, April

As we continue to face an increasingly complex cybersecurity landscape, April 2025 has brought forward new vulnerabilities and the rise of more sophisticated cyber threats. Notable vulnerabilities in critical systems, including Microsoft, Adobe, Cisco, and others, underscore the importance of proactive security measures. Alongside these vulnerabilities, the persistence of ransomware groups continues to be a major concern for organizations globally.

AI Chatbot Security: Understanding Key Risks and Testing Best Practices

Organizations are increasing their reliance on AI chatbots powered by Large Language Models (LLMs) to improve efficiency and reduce costs, creating new challenges for security and development teams. Without well-planned security for integrating AI chatbots into your business operations, you’re leaving the door wide open for bad actors.

The CMMC Rev 2 to Rev 3 Memo: What's Changed?

The world of cybersecurity is always changing, with rapid evolution in both threat and response creating a continual churn in knowledge, technology, and standards. Frameworks meant to help protect systems and businesses, especially the government, tend to be comparatively slow. It takes a lot of momentum and effort to get a new framework iteration through the various committees, analysis groups, and other roadblocks necessary to get it approved.

Mapping Your Cyber Terrain: Understanding Use Cases and How Fidelis Helps

Effective cybersecurity begins with knowing what you’re defending. Organizations investing heavily in security tools often miss something fundamental: a comprehensive understanding of their own environment. This critical gap creates significant risk exposure that sophisticated attackers readily exploit. This article explores cyber terrain mapping; its importance, technical requirements, and how Fidelis Elevate addresses this essential security challenge.