Fujitsu’s role in the Post Office scandal: Everything you need to know
The Post Office scandal began in the late 1990s, when the organisation rolled out Fujitsu’s Horizon computer system across its branch network. What unfolded over…
The Post Office scandal began in the late 1990s, when the organisation rolled out Fujitsu’s Horizon computer system across its branch network. What unfolded over…
The European Union’s cybersecurity agency ENISA has published its 2025 Threat Landscape report, which shows that a significant percentage of the attacks aimed at the…
North Korean nationals who conceal their identities to infiltrate businesses as employees or contractors continue to expand their presence beyond technology companies and America’s borders. …
Microsoft is working to resolve a bug that causes Defender for Endpoint to incorrectly tag some devices’ BIOS (Basic Input/Output System) firmware as outdated, prompting users…
A new proof-of-concept (PoC) tool named Obex has been released, offering a method to prevent Endpoint Detection and Response (EDR) and other monitoring solutions’ dynamic-link…
Cybersecurity researchers at Bishop Fox have revealed security vulnerabilities in the popular, inexpensive YoLink Smart Hub (v0382), leaving users exposed to remote attackers. The hub…
An infostealer and banking Trojan rolled into one is making the rounds in Facebook groups aimed at “active seniors”. Attackers used social engineering methods to…
Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the…
Aston University has opened a centre of excellence to bring together businesses, academia and policy-makers to support the adoption of artificial intelligence (AI), working with…
Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which they’ve dubbed “Gemini Trifecta.” These vulnerabilities, publicly disclosed…
Unknown attackers claiming affiliation with the Cl0p extortion gang are hitting business and IT executives at various companies with emails claiming that they have exfiltrated…
Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of…