Media Spotlight
In The News
Discover how ThreatAware is revolutionising cyber asset visibility and protection. Explore our latest press coverage highlighting our unmatched accuracy and comprehensive approach to cybersecurity.
Why supply chains are the weakest link in today's cyber defenses
Why we need to boost supply chain cyber resilience
Read More →Several London councils targeted in cyber attack - is your data at risk?
At least three London councils have reportedly been hit by cyber attacks in the past 48 hours.
Read More →London councils endure wave of cyber attacks, shared IT services hit
Four London councils have suffered cyber attacks, disrupting services and prompting NCSC-supported investigation
Read More →Iberia issues customer alerts after security incident under investigation
Iberia has begun notifying customers after confirming it experienced a cybersecurity incident involving unauthorised access to systems operated by one of its third-party supplier.
Read More →US telco confirms hackers breached systems in stealthy state-backed cyber campaign
The hackers remained undetected in the Ribbon Communications' systems for months.
Read More →The unseen cyber risk: why financial firms must confront the devices they can't see
Financial institutions can't afford a single gap in their security visibility today.
Read More →Windows 10 Still on Over 40% of Devices as It Reaches End of Support
Users can continue receiving important security updates for Windows 10 by enrolling in the ESU program.
Read More →How bridging the IT visibility gap empowers channel partners
CAASM enhances IT visibility, secures assets, and boosts channel partner growth
Read More →ThreatAware is proud to be recognised for our award-winning, innovative and highly accurate Cyber Asset Attack Surface Management platform.





How to securely manage Windows 10 end of life
ThreatAware CEO Jon Abbott gives his expert advice on securely preparing for Microsoft Windows 10 end of life, coming this October.
Read More →Jaguar Land Rover Operations 'Severely Disrupted' by Cyberattack
The automotive company said it disconnected its systems, which severely impacted both retail and manufacturing operations.
Read More →Scattered Lapsus$ Hunters rage-quit the internet (again), promise to return next year
'We will never stop,' say crooks, despite retiring twice in the space of a month
Read More →Pandora confirms data breach following suspected ShinyHunters cyberattack
Customer information accessed through a third-party platform
Read More →ThreatAware's CEO discusses retail cyber attacks
In the wake of major UK retail cyberattacks, ThreatAware's CEO Jon Abbott appeared to share insights on the growing ransomware threat.
Read More →How to protect yourself from high street hackers
What cybersecurity experts recommend you do following the theft of customer data from M&S and Co-op
Read More →Allianz Life Data Breach Exposes Personal Data of 1.1 Million Customers
The breach targeted a cloud-based customer relationship management (CRM) system.
Read More →M&S and Co-op: UK retailers brace for cyber attacks
The message from the frontline is clear: cyber threats are no longer just an IT issue, they're a business continuity crisis.
Read More →Securing remote workers
Around 20% of employees frequently work from home, creating new security challenges for organisations.
Read More →Scattered Spider widens web to target insurance sector
Insurance companies are warned to be on their guard against a spreading campaign of network intrusions.
Read More →UK Retail Hack Was "Subtle," Not Complex, Says River Island CISO
A “wake-up call” for the retail sector and beyond
Read More →Google warns that hackers are targeting insurance firms
'The insurance industry should be on high alert', says chief analyst
Read More →Qantas cyberattack raises concerns for 6 million customers
The breach, which is believed to have originated through a third-party platform used by the airline's contact centre.
Read More →Are You Overlooking the Riskiest Parts of Your IT Environment?
To stay secure, every device, connection and access point must be seen, understood and protected.
Read More →Scattered Spider spins its web beyond retail, sinks fangs into insurance
"The industry should be on high alert, especially for social engineering schemes which target their help desks and call centres."
Read More →Derisking end-of-life IT assets
Ignorance isn't bliss when it comes to decommissioning old IT assets
Read More →The impact of artificial intelligence (AI) on the UK economy
House of Lords AI Summit warns of 'relentless' cyber threats as UK races to close digital skills gap
Read More →Shining a light on the stealth devices in your IT estate
How unseen devices create security gaps in complex IT environments
Read More →ThreatAware: Transforming IT Asset Security Management
Version 3.0 now enables the remote monitoring and management of all security tools.
Read More →Black Basta Ransomware: A Closer Look at Its Tactics and Targets
Whilst most organisations typically focus on prevention, ThreatAware's approach combines both prevention and rapid response capabilities.
Read More →What If Prevention Was the Key to Cybersecurity Success?
Cyberattacks are one of the biggest threats facing businesses today. ThreatAware's preventative approach is changing how organisations think about security.
Read More →Why fragmented teams increase cybersecurity risk
The complexity of IT estates creates security 'blind spots', opening businesses to attacks.
Read More →Q&A: How can enterprises close dangerous gaps in security visibility?
Organisations are investing more than ever in cybersecurity tools, but many are struggling to achieve an accurate view of their IT estates.
Read More →Cybersecurity in healthcare: getting the basics right as bigger threats loom
Once free support ends, devices become vulnerable to cyber attacks.
Read More →ThreatAware unveils Version 3.0 of its cyber security platform
On average, 15% of devices have security gaps that need immediate attention.
Read More →ThreatAware launches new Cyber Asset Attack Surface Management (CAASM) platform
Stealth device tracking: the most comprehensive approach to asset discovery and protection.
Read More →Winner of the Best Product Award at the Annual Cyber Security Awards 2025
The Cyber Security Awards were established to recognize the best individuals, teams, and companies within the cybersecurity industry.
Read More →Media Contact
For press enquiries, interview requests, or additional information about ThreatAware, please contact our media relations team.