Top cybersecurity conferences to attend in 2026
2026 is almost upon us, and with it comes a slate of must-attend cybersecurity conferences. Security experts from across sectors will come together to hear…
2026 is almost upon us, and with it comes a slate of must-attend cybersecurity conferences. Security experts from across sectors will come together to hear…
WhatsApp has won a ruling against spyware maker NSO Group forbidding it from targeting its users, while NSO Group in the same ruling got a…
Microsoft is rolling out a fix for Active Directory issues affecting some Windows Server 2025 systems after installing security updates released since September. As Redmond…
Network connectivity issues in AWS’ US-EAST-1 facility have caused widespread outages affecting thousands of websites along with some of the world’s most popular apps –…
Cross-site scripting vulnerabilities are, by no doubt, one of the vulnerability types that’ll keep haunting applications for a long time. This seamless injection bug can…
Listen to the article 13 min This audio is auto-generated. Please let us know if you have feedback. Government agencies, private businesses and nonprofit organizations…
For those of us who’ve tracked the ever-shifting landscape of cybersecurity, the narrative has always been one of escalating threats met with evolving defenses. But…
At the end of August, the AI company Anthropic announced that its chatbot Claude wouldn’t help anyone build a nuclear weapon. According to Anthropic, it…
Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak into yet another one. The…
This week on the Lock and Code podcast… Google is everywhere in our lives. It’s reach into our data extends just as far. After investigating…
Atos has built additional UK delivery infrastructure, with a series of investments aimed to reassure customers their data is stored and processed using military-grade security.…
Cross-site scripting vulnerabilities are, by no doubt, one of the vulnerability types that’ll keep haunting applications for a long time. This seamless injection bug can…