您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [Raconteur]:网络安全 - 发现报告

网络安全

信息技术 2025-05-01 Raconteur @·*&&
报告封面

CYBERSECURITY CAN THE UK BOLSTERDIGITAL RESILIENCE?WHY DIGITAL TRUSTIS AT A RECORD LOW0402 TRUMP'S CYBER CUTSPUT US ALLIES ON EDGE11 CYBERSECURITY How Westminster plansto bolster digital resilience ‘Quantum is not just atechnical challenge’ Distributed in Published in association with The government has revealed details of the cyber secuirty and digital resilience bill,which aims to protect the UK’s critical infrastructure This year’s Infosecurity Europe willprepare security professionals for a wave Contributor Tamlin Magee Tamlin MageeSenior technology writer atRaconteur. He's interestedin big ideas shaping revealing further details oftheupcoming cyber security andresilience bill, which was first teasedin the King’s Speech in July 2024. The bill, which will enter parlia-ment later this year, has three pri-mary goals. One is to strengthenthe cyber defences of IT providerssupplyinggovernment or public skills in digital forensics, cloud se- masterclasses will feature live simu-lations, deep-dive techniques and Westminsterplanstoextendthese regulations to include IT pro-viders for public sector organisa-tions. It estimates that up to 1,000IT suppliers would be redefined as that cannot be ignored. quantum computing. The US Na- The designation will be applied toIT suppliers of any critical public Production executiveSabrina Severino Design and illustrationKellie JerrardJames Lampard access large organisations through Commercialproduction managersAlex Datcu B2B marketing has neverbeen louder – but audienceshave never cared less.The Value Dividend aimsto stem the tide. It’s our Download our guideand discover: How to createcampaigns thatoverdeliverHow to foster trueengagement Although this publication is funded through advertising andsponsorship, all editorial is without bias and sponsored featuresare clearly labelled. For an upcoming schedule, partnershipinquiries or feedback, please call +44 (0)20 3877 3800 or Three further measures are beingconsidered, but are not yet included Raconteur is a leading business media organisation and the 2022PPA Business Media Brand of the Year. Our articles cover a widerange of topics, including technology, leadership, sustainability,workplace, marketing, supply chain and finance. Raconteur special Datacentres,which were rede-fined as critical national infrastruc-ture in the UK in September 2024,could be included in the scope ofthe regulation. Under the proposal, He adds that the government mustworkclosely with industry whencrafting AI policies to ensure thatany new legislation does not inhibitgrowth and innovation unnecessar- reports are published exclusively inThe TimesandThe Sunday The information contained in this publication has been obtainedfrom sources the Proprietors believe to be correct. However, nolegal liability can be accepted for any errors. No part of thispublication may be reproduced without the prior consent of thePublisher. © Raconteur Media Ensure your content paysthe value dividend. Download now The session will also cover how theindustry is responding through ini-tiativesand what steps security Of the 224 colocation data centresin the UK, managed by 68 operators, Brad Maule-ffinchEvent director, Infosecurity Europe @raconteur.storiesraconteur-media raconteur.net How to use AI tooutpace tomorrow’sZora Zhuang via Getty Images and harvest millions of identity recordswith minimal human intervention.”Recent breaches at Snowflake andChangeHealthcarealsorevealedanother new pattern: attackers using In today’s threatlandscape, identity Public trustin digitaltech plumbsP R I V A C Y Infostealermalware uses a mul-ti-stage process that helps to circum-vent modern security measures. “Initialinfectiontypically occurs throughphishing, malicious advertisements or Cybercriminals are using AI to launch faster, more targeted identity attacks.To keep up, organisations must adopt proactive, AI-driven security strategies The malware then harvests creden-tials from multiple sources, includingweb browsers. “What makes infosteal-ers especially dangerous is their abilityto bypass SSO and multi-factor authen- Recorded Future’s research has alsoidentified significant growth in supplychain credential compromises, whereattackerstarget third-party serviceproviders to gain access to multipledownstream organisations simultane-ously. “A single compromised vendorled to data exposure across dozens ofenterprise customers in several caseswe analysed,” says Smilyanets.Sophisticated cyber attacksNo organisation is immune to thesethreats,which can cause tremen-dous damage. In February 2025, theGrubHub data breach exposed millionsof customers’ and drivers’ identities.Attackers claimed to have stolen 70million lines of data, including millionsof hashed passwords, phone numbersand email addresses.The intrusion was traced to a third-party service provider, which the threatactors used to access the contact infor-mation of campus diners, merchantsand drivers