ZYNC NEWS
Are We Losing the Best Cyber Talent Because of Bias?
Here’s something we need to talk about more openly in the DACH cyber security market: discriminatory hiring practices. And we’re not just talking about unconscious bias or subtle preferences. We’re talking about openly discriminatory hiring requests,...
BY: Burhan ChoudhryStalkerware... Tracking Without Consent
Most cybersecurity discussions focus on big, external threats: ransomware, phishing, and nation-state attackers. But there’s a quieter, more personal form of digital abuse that deserves attention: stalkerware. Stalkerware isn’t about stealing data...
BY: Burhan ChoudhryYour Password Has Probably Been Sold
If you`re in cyber security, you`re used to big, dramatic attack headlines, but sometimes, the biggest threat is a login someone reused in 2018. Credential-based attacks are surging in both frequency and sophistication. This blog breaks down what ...
BY: Burhan ChoudhryWho’s Securing the Supercomputers?
Another big AI headline landed this week. The UK government has announced over £1 billion in funding to boost AI infrastructure, with investments going into compute power, supercomputers, and digital skills. But while most coverage is focused on t...
BY: Burhan ChoudhryIs Your Security Ready for Quantum?
Quantum computing has been floating around tech headlines for years, often accompanies by phrases like “the future” or “still decades away.” But if you’ve been paying attention to the noise coming out of governments and standards bodies lately, you’l...
BY: Burhan Choudhry37 Terabytes in 45 Seconds: What Just Happened?
This week, Cloudflare casually dropped the news that they blocked the biggest DDoS attack ever recorded. 37.4 terabytes of traffic all slammed into one IP in under a minute. To visualise that, it’s like trying to stream over 9,000 HD movies at onc...
BY: Burhan ChoudhryAre We Just Training Future AI Attackers for Free?
There’s never been more cybersecurity knowledge out in the open than there is today. Blog posts, whitepapers, Github repos, open-source tooling, step-by-step videos, detailed writeups of zero-days and attack paths - the industry thrives on transparen...
BY: Burhan ChoudhryManners Cost Nothing… Or Do They?
We`ve all been taught from a young age that manners don`t cost a thing. Say please. Say thank you. Don`t interrupt. Don`t feed the AI after midnight (wait, wrong horror story). But recently, that old saying is getting a bit of a rethink, especiall...
BY: Aden GwynneNot Just Any Cyber Incident: The M&S Attack
When you think of Marks & Spencer (M&S), you probably picture Percy Pigs, classy ready meals, and comfy pants... not cyber attacks. But over the past week, M&S has found itself dealing with a serious cyber incident that’s caused major disruption acro...
BY: Charlie FrostWhen Security Debt Comes Due
You’ve heard of tech debt, those shortcuts in development that come back to bite you later. Well, meet its close cousin: security debt. And if the recent attacks on M&S, Co-op, and Harrods tell us anything, it’s that this kind of debt doesn’t stay hi...
BY: Dhillon Singh