the cyber lounge
what is
the cyber
lounge?
The cyber lounge is the go-to community for everybody involved in Cyber Security.
We’ve got talks with Cyber experts packed full of insider insights and tips on progression, videos on how to retain the best Cyber talent, webinars on hot topics in Cyber and a load more too!
who it’s
aimed at
-
Looking to Progress?
What better place to learn how to progress your career in Cyber than hearing top advice from industry experts, joining debates and discussions to broaden your knowledge.
-
Stay in the Loop!
An ideal area to get lost in, staying up to date with the latest Cyber news and advancements and keeping you in the know at all times.
-
New to Cyber?
The perfect place to get clued up on all you need to see if Cyber Security is the route for you, here to help you get all the help and advice you need.
-
innovators
Network and engage with the innovators, movers and shakers through an exclusive member’s forum made for the cyber community, by the cyber community.
The Cyber lounge was created to give something back to the incredible industry we’re immersed in.
We wanted to provide a place where everybody could network with other Cyber Security professionals, learn and advance their knowledge and grow as a Cyber Security professional.
coming soon
- Live events
- Shop
- Training providers
- Lots of free resources
- Exclusive discounts and access to suppliers
blogs
Are We Losing the Best Cyber Talent Because of Bias?
Here’s something we need to talk about more openly in the DACH cyber security market: discriminatory hiring practices. And we’re not just talking about unconscious bias or subtle preferences. We’re talking about openly discriminatory hiring requests,...
BY: Burhan ChoudhryStalkerware... Tracking Without Consent
Most cybersecurity discussions focus on big, external threats: ransomware, phishing, and nation-state attackers. But there’s a quieter, more personal form of digital abuse that deserves attention: stalkerware. Stalkerware isn’t about stealing data...
BY: Burhan ChoudhryYour Password Has Probably Been Sold
If you`re in cyber security, you`re used to big, dramatic attack headlines, but sometimes, the biggest threat is a login someone reused in 2018. Credential-based attacks are surging in both frequency and sophistication. This blog breaks down what ...
BY: Burhan ChoudhryWho’s Securing the Supercomputers?
Another big AI headline landed this week. The UK government has announced over £1 billion in funding to boost AI infrastructure, with investments going into compute power, supercomputers, and digital skills. But while most coverage is focused on t...
BY: Burhan ChoudhryIs Your Security Ready for Quantum?
Quantum computing has been floating around tech headlines for years, often accompanies by phrases like “the future” or “still decades away.” But if you’ve been paying attention to the noise coming out of governments and standards bodies lately, you’l...
BY: Burhan Choudhry37 Terabytes in 45 Seconds: What Just Happened?
This week, Cloudflare casually dropped the news that they blocked the biggest DDoS attack ever recorded. 37.4 terabytes of traffic all slammed into one IP in under a minute. To visualise that, it’s like trying to stream over 9,000 HD movies at onc...
BY: Burhan ChoudhryAre We Just Training Future AI Attackers for Free?
There’s never been more cybersecurity knowledge out in the open than there is today. Blog posts, whitepapers, Github repos, open-source tooling, step-by-step videos, detailed writeups of zero-days and attack paths - the industry thrives on transparen...
BY: Burhan ChoudhryManners Cost Nothing… Or Do They?
We`ve all been taught from a young age that manners don`t cost a thing. Say please. Say thank you. Don`t interrupt. Don`t feed the AI after midnight (wait, wrong horror story). But recently, that old saying is getting a bit of a rethink, especiall...
BY: Aden GwynneNot Just Any Cyber Incident: The M&S Attack
When you think of Marks & Spencer (M&S), you probably picture Percy Pigs, classy ready meals, and comfy pants... not cyber attacks. But over the past week, M&S has found itself dealing with a serious cyber incident that’s caused major disruption acro...
BY: Charlie FrostWhen Security Debt Comes Due
You’ve heard of tech debt, those shortcuts in development that come back to bite you later. Well, meet its close cousin: security debt. And if the recent attacks on M&S, Co-op, and Harrods tell us anything, it’s that this kind of debt doesn’t stay hi...
BY: Dhillon SinghIs Social Media Breaking Our Teens?
We all know social media isn’t going anywhere. It’s where teenagers (and adults!) connect, escape, scroll, and share. It’s built into how we live, especially for the younger generation. But behind the funny memes and trending dances, something dar...
BY: Mo AbdukadirRussia, Emails, and Academic Espionage? Germany’s Latest Cyber Scare
It’s never a dull moment when it comes to cybersecurity, and this week, Germany’s in the spotlight again. Intelligence officials have confirmed that they’re investigating a suspected Russian cyberattack. The target? The German Association for East Eu...
BY: Mo AbdukadirQ1 2025 Zync Catch-up! New Offices, Big Career Moves and Massive Discounts.
Well… Q1 has been a busy one! So many exciting things to share, so let’s start with arguably the biggest news, Zync has officially landed in Germany! We’re thrilled to announce the opening of our new branch in Düsseldorf. Having a base in this incred...
BY: Burhan ChoudhryWhat The UK’s New Digital Safety Laws Mean
The UK has just rolled out some major new digital safety laws, and if you run an online platform, this is something you’ll want to pay attention to. The Online Safety Act (OSA) is designed to make the internet a safer place, but it’s also raising a f...
BY: Mo AbdukadirBSI Lagebericht 2024: What It Means for Your Business
Every year, the BSI (that’s Germany’s Federal Office for Information Security) releases its Lagebericht. It’s packed with insights, stats, and trends that show us what’s really happening in the world of cyber threats and how businesses can stay safe....
BY: Dylan UterInside the Evil Corp Cybercrime Syndicate
The notorious Evil Corp, one of the most prolific cybercrime groups in history, has been linked to a staggering amount of global financial losses. Operating out of Russia, the group is best known for its Dridex malware and high-profile ransomware att...
BY: Mo AbdukadirThe Dark Web and the Rising Demand for Cybercrime.
The Dark Web is like the basement of the internet – mysterious, hidden, and often up to no good. But recently, it’s been more active than ever, making headlines for all the wrong reasons. So, what’s going on down there, and why should we care? A Q...
BY: Holly BellisWhy Are Young People Getting Into Cyber Crime – And How Can We Stop It?
When we picture cyber criminals, we might imagine shady figures working in the shadows, but the truth is, many of them are teenagers. The average age of a cyber criminal in the UK is just 17 years old according to the National Crime Agency (NCA). So,...
BY: Dhillon SinghThe Voice of Danger: AI’s New Cyber Threat
AI is reshaping our world in countless ways. Whether it`s automating tasks or helping us make better decisions, AI is becoming a crucial part of our daily lives. But with every new advancement, there`s a flip side, especially for those of us in cyber...
BY: Charlie FrostDon’t Get Hooked: Understanding Browser Hooking
Today, we`re diving into a fascinating and critical topic: browser hooking. We`ll explore how browser hooking works, the potential damage it can cause, and, most importantly, how we can protect ourselves and our organisations. So grab a cup of coffee...
BY: Dylan UterJune at Zync: Thrills, Spills, and Culinary Skills!
After a fantastic April and an even better May, we were gunning for a massive success in June to meet a stretched target for our team holiday (some of us had already started packing!). But, as anyone in recruitment knows, it can be a rollercoaster. J...
BY: Charlie FrostApple’s New PCC: A Game-Changer in Cloud AI Technology
Apple has just made a significant leap into the cloud computing arena with the launch of its new Cloud Intelligence System, known as PCC (Private Cloud Computing). This move has created quite a buzz in the tech industry, with experts predicting that ...
BY: Charlie FrostMay at Zync: Mario Kart and A-May-Zync Achievements!
We left April on a high note, and May was no different! The momentum kept building, pushing us a whopping 80% of the way to our holiday goal – with a whole month left! ? Looks like we might need to start packing those suitcases... In recruitment, ...
BY: Charlie FrostCyber security in Smart Cities: Protecting Urban Infrastructure
As technology advances, our cities are getting smarter. We have traffic lights that adjust to real-time conditions and utilities that monitor usage and efficiency, making urban life more convenient and efficient. But with these advancements come new ...
BY:Credential Stuffing Surges: Time to Rethink Your Passwords?
Stuffing is back on the menu! Okta, a leader in secure access and identity management and authentication, recently identified a significant increase in credential stuffing attacks. Credential stuffing involves attackers leveraging stolen username...
BY: Charlie FrostHacking Keyless Entry Cars: The Convenient Nightmare
Many of us have enjoyed the ease of keyless entry and start systems in our cars. No more fumbling for keys in the rain, just a tap or a wave and you`re on your way. But what does this convenience come at a hidden cost? Many drivers are facing a r...
BY: Dylan UterThe Dark Side of Chatbots: GenAI on the Dark Web
While user-friendly AI assistants are becoming commonplace, a disturbing trend lurks within the dark web`s depths. Generative AI (GenAI) chatbots like "DarkBERT" pose a significant threat due to their unique training data. Unlike their benign coun...
BY: Holly BellisFujitsu Hit by Malware Attack: What You Need to Know
March 18th, 2024 saw tech giant Fujitsu become the target of a malware attack. This blog delves into the reported details and potential implications. The Breach: Infiltration via Malware Initial reports suggest that hackers gained access to Fuj...
BY:Kali Linux 2024.1 Released: New Tools, Updated Look, and More
Last week, Kali Linux released their first major update of 2024, Kali Linux 2024.1. This release brings a range of new features and improvements for security professionals and ethical hackers. New Tools: Blue-hydra: Simplifies the discovery ...
BY: Dylan UterFebruary at Zync: Wins, Curry, and Big Congrats!
This month`s newsletter is packed with celebrations, new faces, and a whole lot of curry! Six Years of Holly! A massive shoutout to Holly who just hit her six-year anniversary at Zync! Starting as a Trainee back in 2018, she`s climbed the ladd...
BY:interviews
Purav Desai
Cyber Expert Insights - Purav Desai, Microsoft 365 Incident Responder Purav Desai is a Cyber Security professional with over 3 and a half years of experience spanning a variety of roles. He holds Microsoft Security certifications and regularly c...
Cesar Vega
Cyber Expert Insights - Cesar Vega, Information Security Specialist, Financial Services. We caught up with Cesar Vega, who originally from Mexico, moved to Germany 14 years ago to further his career in Information Security. We discussed the u...