UK’s Online Safety Act: Ofcom Now Empowered to Sanction Misbehaving Tech Platforms
The UK's Online Safety Act has equipped Ofcom with new powers to sanction tech platforms for failing to remove illegal...
The UK's Online Safety Act has equipped Ofcom with new powers to sanction tech platforms for failing to remove illegal...
A large-scale malicious app campaign is bypassing Android security, leading to over 60 million downloads of harmful applications from the...
The digital supply chains of UK companies are notably larger and more complex compared to their global counterparts, posing significant...
Cloudflare is pioneering post-quantum cryptography (PQC) to protect online communications from future quantum threats, enhancing its Zero Trust platform's security....
Data breaches have surged by 6% year-on-year, resulting in an alarming 16.8 billion records being exposed in 2024. This increase...
A recent study by Specops uncovers prevalent passwords used in attacks on Remote Desktop Protocol (RDP), emphasizing the security risks...
Google's acquisition of Wiz for $32 billion marks a significant leap in cloud security offerings, enhancing its capabilities to support...
Newly leaked chat logs reveal a concerning connection between the BlackBasta ransomware gang and Russian governmental authorities. The recent revelations...
A recent study reveals how GenAI tools can create information-stealing malware. This research, led by Vitaly Simonovich at Cato Networks,...
In a significant move, US authorities have extradited Rostislav Panev, a dual national of Russia and Israel, on serious charges...
Fraudsters are now impersonating the Clop ransomware gang, highlighting a concerning trend in business extortion tactics. Recent findings by researchers...
In today's increasingly protectionist global landscape, cybersecurity organizations need to enhance collaboration to combat escalating threats, as emphasized by Sir...
A vulnerability has been identified in Juniper Junos OS. An attacker could exploit this vulnerability to trigger remote code execution...
A vulnerability has been identified in Apple Products. A remote attacker could exploit this vulnerability to trigger remote code execution...
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution,...
The UK ICO has issued an important warning regarding the handling of children's data, urging digital firms to comply with...
In Q4 2024, cybersecurity startups experienced a substantial influx of venture capital investment, marking a remarkable 35% year-on-year growth. Venture...
Tech complexity poses significant challenges for UK cybersecurity leaders, hindering their ability to secure systems effectively. The ever-increasing complexity of...
The Volt Typhoon cyber intrusion highlights critical vulnerabilities within the US electric grid, raising urgent cybersecurity concerns. A prolonged cyber...
The ClickFix phishing scam is a sophisticated campaign targeting the hospitality industry by impersonating Booking.com. A sophisticated ClickFix phishing scam...
The Medusa ransomware operation poses a significant threat to critical infrastructure, warning organizations to take proactive measures. The Cybersecurity and...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution,...
The UK cybersecurity sector has recently shown remarkable growth, with revenue increasing by 12% to surpass £13 billion, according to...