Microsoft to Disable NTLM by Default as a Step Towards More Secure Authentication
The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over three decades, is being accelerated.…
The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over three decades, is being accelerated.…
Hikvision has disclosed a high-severity command execution vulnerability affecting multiple wireless access point models, potentially allowing authenticated attackers to execute arbitrary commands on affected devices.…
The Everest ransomware group has claimed responsibility for a data breach involving systems linked to Polycom, a legacy enterprise communications brand that was acquired by…
OpenAI has launched the new Codex app for macOS, a dedicated workspace for managing multiple AI coding agents in parallel. The app is designed to…
Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer of location tracking that operates…
The UK is beginning 2026 with big artificial intelligence (AI) ambitions, but without a clear approach to the data that underpins them. Despite some recent…
APT28 exploits Microsoft Office flaw in Operation Neusploit Pierluigi Paganini February 03, 2026 Russia-linked APT28 is behind Operation Neusploit, exploiting a newly disclosed Microsoft Office…
TL;DR We’re launching Internal Scanning, bringing our proprietary security engines, research-led crawling and fuzzing engine for internal vulnerability scanning behind your firewall. Built by Detectify’s…
Hong Kong’s banking regulator has unveiled four flagship projects, including a quantum computing readiness index, to help the city’s lenders stay competitive and secure in…
A new phishing campaign is tricking people with fake party invitations that secretly install remote access software on Windows computers. The attack uses social engineering…
A malicious application on the Google Play Store masquerading as a legitimate document reader. The deceptive application, which has accumulated over 50,000 downloads, functions as…
Enterprise storage environments already run long qualification cycles as solid-state drive capacities rise and validation teams try to mirror production workloads. Preconditioning steps now consume…