Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

BlueVoyant Strengthens Cyber Defence for ODEON Cinemas Group Across Eight Countries

BlueVoyant announces that it has partnered with ODEON Cinemas Group (OCG), Europe's largest cinema operator, to unify and modernise its security operations across eight countries. The collaboration delivers 24/7 protection, rapid incident response, and enhanced visibility into thirdparty risk, significantly reducing operational noise and strengthening OCG's overall cyber resilience.

Detecting Identity Attacks at Scale with Herd Immunity

Modern identity‑based attacks often rely on shared infrastructure and reusable attack frameworks, rather than bespoke tooling built for a single target. Phishing kits and phishing‑as‑a‑service (PhaaS) platforms are the clearest example of this model — and today they are the most prevalent sources of account compromise across organizations of all sizes. Device code phishing illustrates how quickly this model evolves.

Cybersecurity in 2026: Why the Risk Is Bigger Than Ever

Cybersecurity is no longer something only large enterprises need to worry about. In 2026, it affects every organization, from small businesses and managed service providers to global companies and individual users. What has changed is not just the number of cyberattacks. It is how quickly they happen, how far they can spread, and how much damage they can cause.

Beyond the Breach: How Digital Forensics Is Evolving for Modern Cyber Risk

Cyberattacks still break trust. That hasn’t changed. What has changed is how quickly organizations are expected to understand what’s happening and act on it. In today’s environments, answers are demanded in minutes, not days. Leadership needs clarity while systems are still running, customers are still online, and the situation is still unfolding. This is where digital forensics is entering its next chapter.

Beyond automation: why networking teams need orchestration

Networking teams have invested heavily in automation to help them manage increasing workloads and reduce manual tasks. Yet many still face the same issues, like outages, stalled operations, and managing growing incident volume. This problem isn’t a lack of automation: it’s what happens after automation runs. Automation is useful for individual tasks, but it can’t handle the complexity of real-world networking processes, which demand coordination across teams, environments, and tools.

Understanding the Australian Information Security Manual (ISM)

The Essential Eight identifies the most critical cybersecurity risk mitigation controls, providing a set of minimum baseline strategies. As organizations work to mature the security posture, the Essential Eight maturity model offers some options that they can use. However, for organizations that need to implement a more comprehensive security program, the Australian Signals Directorate (ASD) published the Information Security Manual (ISM).

Why AI-Only Threat Intelligence Is a Risk Your Organisation Cannot Afford

SaaS-only platforms are betting everything on automation. But when the threat landscape demands judgement, data volume alone is not the answer. For years, a certain category of threat intelligence vendor has sold the same idea: feed your data into our platform, let the AI process it, and your security team will have everything they need. It is a compelling proposition, particularly for organisations under pressure to demonstrate coverage without expanding headcount.

Weekly Cyber Security News 14/05/2026

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Are you on the fence with this too? Your hard disk may not be all safe and secure as you think… I think this counts as one of those WTF moments right?

From Blocking to Trust: Why Detection Alone Isn't Enough

For most of the last decade, the central question in bot management was a binary one: is this traffic malicious? If yes, block it. If no, let it through. That question was the right one to ask when the problem was DDoS traffic, credential stuffing, and inventory-hoarding scalpers. It is no longer the right question for a significant proportion of the non-human traffic now hitting enterprise digital platforms.

The End of the Exploit Window: How Frontier AI Is Changing CVE Prioritization

When a new vulnerability is announced, the race begins. Security teams jump into action, checking exposure, triaging events, identifying affected systems, and figuring out how quickly they can patch. The clock is ticking and they know it. At the same moment, threat actors are doing their own version of that work. They’re reading the same advisories, watching the same feeds, and asking a much simpler question: Who is still vulnerable?