the cyber lounge
what is
the cyber
lounge?
The cyber lounge is the go-to community for everybody involved in Cyber Security.
We’ve got talks with Cyber experts packed full of insider insights and tips on progression, videos on how to retain the best Cyber talent, webinars on hot topics in Cyber and a load more too!
who it’s
aimed at
-
Looking to Progress?
What better place to learn how to progress your career in Cyber than hearing top advice from industry experts, joining debates and discussions to broaden your knowledge.
-
Stay in the Loop!
An ideal area to get lost in, staying up to date with the latest Cyber news and advancements and keeping you in the know at all times.
-
New to Cyber?
The perfect place to get clued up on all you need to see if Cyber Security is the route for you, here to help you get all the help and advice you need.
-
innovators
Network and engage with the innovators, movers and shakers through an exclusive member’s forum made for the cyber community, by the cyber community.
The Cyber lounge was created to give something back to the incredible industry we’re immersed in.
We wanted to provide a place where everybody could network with other Cyber Security professionals, learn and advance their knowledge and grow as a Cyber Security professional.
coming soon
- Live events
- Shop
- Training providers
- Lots of free resources
- Exclusive discounts and access to suppliers
blogs
Manners Cost Nothing… Or Do They?
We`ve all been taught from a young age that manners don`t cost a thing. Say please. Say thank you. Don`t interrupt. Don`t feed the AI after midnight (wait, wrong horror story). But recently, that old saying is getting a bit of a rethink, especiall...
BY: Aden GwynneNot Just Any Cyber Incident: The M&S Attack
When you think of Marks & Spencer (M&S), you probably picture Percy Pigs, classy ready meals, and comfy pants... not cyber attacks. But over the past week, M&S has found itself dealing with a serious cyber incident that’s caused major disruption acro...
BY: Charlie FrostWhen Security Debt Comes Due
You’ve heard of tech debt, those shortcuts in development that come back to bite you later. Well, meet its close cousin: security debt. And if the recent attacks on M&S, Co-op, and Harrods tell us anything, it’s that this kind of debt doesn’t stay hi...
BY: Dhillon SinghIs Social Media Breaking Our Teens?
We all know social media isn’t going anywhere. It’s where teenagers (and adults!) connect, escape, scroll, and share. It’s built into how we live, especially for the younger generation. But behind the funny memes and trending dances, something dar...
BY: Mo AbdukadirRussia, Emails, and Academic Espionage? Germany’s Latest Cyber Scare
It’s never a dull moment when it comes to cybersecurity, and this week, Germany’s in the spotlight again. Intelligence officials have confirmed that they’re investigating a suspected Russian cyberattack. The target? The German Association for East Eu...
BY: Mo AbdukadirQ1 2025 Zync Catch-up! New Offices, Big Career Moves and Massive Discounts.
Well… Q1 has been a busy one! So many exciting things to share, so let’s start with arguably the biggest news, Zync has officially landed in Germany! We’re thrilled to announce the opening of our new branch in Düsseldorf. Having a base in this incred...
BY: Burhan ChoudhryWhat The UK’s New Digital Safety Laws Mean
The UK has just rolled out some major new digital safety laws, and if you run an online platform, this is something you’ll want to pay attention to. The Online Safety Act (OSA) is designed to make the internet a safer place, but it’s also raising a f...
BY: Mo AbdukadirBSI Lagebericht 2024: What It Means for Your Business
Every year, the BSI (that’s Germany’s Federal Office for Information Security) releases its Lagebericht. It’s packed with insights, stats, and trends that show us what’s really happening in the world of cyber threats and how businesses can stay safe....
BY: Dylan UterInside the Evil Corp Cybercrime Syndicate
The notorious Evil Corp, one of the most prolific cybercrime groups in history, has been linked to a staggering amount of global financial losses. Operating out of Russia, the group is best known for its Dridex malware and high-profile ransomware att...
BY: Mo AbdukadirThe Dark Web and the Rising Demand for Cybercrime.
The Dark Web is like the basement of the internet – mysterious, hidden, and often up to no good. But recently, it’s been more active than ever, making headlines for all the wrong reasons. So, what’s going on down there, and why should we care? A Q...
BY: Holly BellisWhy Are Young People Getting Into Cyber Crime – And How Can We Stop It?
When we picture cyber criminals, we might imagine shady figures working in the shadows, but the truth is, many of them are teenagers. The average age of a cyber criminal in the UK is just 17 years old according to the National Crime Agency (NCA). So,...
BY: Dhillon SinghThe Voice of Danger: AI’s New Cyber Threat
AI is reshaping our world in countless ways. Whether it`s automating tasks or helping us make better decisions, AI is becoming a crucial part of our daily lives. But with every new advancement, there`s a flip side, especially for those of us in cyber...
BY: Charlie FrostDon’t Get Hooked: Understanding Browser Hooking
Today, we`re diving into a fascinating and critical topic: browser hooking. We`ll explore how browser hooking works, the potential damage it can cause, and, most importantly, how we can protect ourselves and our organisations. So grab a cup of coffee...
BY: Dylan UterJune at Zync: Thrills, Spills, and Culinary Skills!
After a fantastic April and an even better May, we were gunning for a massive success in June to meet a stretched target for our team holiday (some of us had already started packing!). But, as anyone in recruitment knows, it can be a rollercoaster. J...
BY: Charlie FrostApple’s New PCC: A Game-Changer in Cloud AI Technology
Apple has just made a significant leap into the cloud computing arena with the launch of its new Cloud Intelligence System, known as PCC (Private Cloud Computing). This move has created quite a buzz in the tech industry, with experts predicting that ...
BY: Charlie FrostMay at Zync: Mario Kart and A-May-Zync Achievements!
We left April on a high note, and May was no different! The momentum kept building, pushing us a whopping 80% of the way to our holiday goal – with a whole month left! ? Looks like we might need to start packing those suitcases... In recruitment, ...
BY: Charlie FrostCyber security in Smart Cities: Protecting Urban Infrastructure
As technology advances, our cities are getting smarter. We have traffic lights that adjust to real-time conditions and utilities that monitor usage and efficiency, making urban life more convenient and efficient. But with these advancements come new ...
BY:Credential Stuffing Surges: Time to Rethink Your Passwords?
Stuffing is back on the menu! Okta, a leader in secure access and identity management and authentication, recently identified a significant increase in credential stuffing attacks. Credential stuffing involves attackers leveraging stolen username...
BY: Charlie FrostHacking Keyless Entry Cars: The Convenient Nightmare
Many of us have enjoyed the ease of keyless entry and start systems in our cars. No more fumbling for keys in the rain, just a tap or a wave and you`re on your way. But what does this convenience come at a hidden cost? Many drivers are facing a r...
BY: Dylan UterThe Dark Side of Chatbots: GenAI on the Dark Web
While user-friendly AI assistants are becoming commonplace, a disturbing trend lurks within the dark web`s depths. Generative AI (GenAI) chatbots like "DarkBERT" pose a significant threat due to their unique training data. Unlike their benign coun...
BY: Holly BellisFujitsu Hit by Malware Attack: What You Need to Know
March 18th, 2024 saw tech giant Fujitsu become the target of a malware attack. This blog delves into the reported details and potential implications. The Breach: Infiltration via Malware Initial reports suggest that hackers gained access to Fuj...
BY:Kali Linux 2024.1 Released: New Tools, Updated Look, and More
Last week, Kali Linux released their first major update of 2024, Kali Linux 2024.1. This release brings a range of new features and improvements for security professionals and ethical hackers. New Tools: Blue-hydra: Simplifies the discovery ...
BY: Dylan UterFebruary at Zync: Wins, Curry, and Big Congrats!
This month`s newsletter is packed with celebrations, new faces, and a whole lot of curry! Six Years of Holly! A massive shoutout to Holly who just hit her six-year anniversary at Zync! Starting as a Trainee back in 2018, she`s climbed the ladd...
BY:From Pwned to Protected: Managing Your Digital Footprint
We`ve all heard the term "digital footprint," but how often do we truly consider its size and potential impact? A recent conversation with a colleague (who, after checking Have I Been Pwned?: https://haveibeenpwned.com/, was surprised by the number o...
BY: Holly BellisOperation Cronos: A Rare Win Against Ransomware
The recent news of Operation Cronos, a collaborative effort by international authorities, marks a significant and rare victory in the fight against ransomware. This operation targeted the notorious LockBit gang, responsible for widespread attacks tha...
BY: Charlie FrostLove is in the Air, But So Are Romance Scams
Ah, Valentine`s Day. A time for chocolates, roses, candlelit dinners... and unfortunately, cybersecurity threats. While love is in the air, so are malicious actors looking to exploit the season`s heightened emotions. Don`t let your romantic plans tur...
BY:January 2024: New Faces, Fun Times, Record Success!
We kicked off 2024 with a bang at Zync, and it`s already proving to be a year filled with success, celebrations, and new milestones. Let`s get into the exciting updates from January: Welcome Jacob to the Team! Jacob joined our team working with...
BY: Holly BellisDecoded: The Johnson Controls Ransomware Attack
The September 2023 ransomware attack on Johnson Controls, a global leader in smart building technology, sent shockwaves through the cybersecurity industry. This seemingly targeted assault exposed vulnerabilities and highlighted the evolving tactics o...
BY:Building Global Cyber Resilience in 2024
As technology advances, so too do cyber threats, demanding constant vigilance and proactive defence. In this week’s blog we a going to delve into the crucial role of businesses and governments in building cyber resilience. Firstly, let`s acknowled...
BY: Charlie FrostA Look at Cyber Attacks and Data Breaches in 2024
2023 was a year marked by a significant increase in cyberattacks and data breaches. From major corporations to healthcare providers, no one was immune. These attacks caused significant financial losses, reputational damage, and even disruptions to cr...
BY: Charlie Frostinterviews
Purav Desai
Cyber Expert Insights - Purav Desai, Microsoft 365 Incident Responder Purav Desai is a Cyber Security professional with over 3 and a half years of experience spanning a variety of roles. He holds Microsoft Security certifications and regularly c...
Cesar Vega
Cyber Expert Insights - Cesar Vega, Information Security Specialist, Financial Services. We caught up with Cesar Vega, who originally from Mexico, moved to Germany 14 years ago to further his career in Information Security. We discussed the u...