CYBERUK ’26: UK lagging on legal protections for cyber pros
The increasingly long-in-the-tooth Computer Misuse Act (CMA) of 1990 remains an albatross around the neck of British cyber security professionals, and even though the UK…
The increasingly long-in-the-tooth Computer Misuse Act (CMA) of 1990 remains an albatross around the neck of British cyber security professionals, and even though the UK…
Home Affairs’ chief digital officer Radi Kovacevic is leaving the agency to take up the vacant chief information and digital officer role at Austrade. Radi…
Days after Anthropic unveiled its Claude Mythos AI model, OpenAI introduced GPT-5.4-Cyber, a cybersecurity-focused model that will be offered to many defenders. OpenAI announced that…
Cisco fixed four critical flaws in Identity Services and Webex Pierluigi Paganini April 16, 2026 Cisco fixed four critical flaws in Identity Services and Webex…
Experts worry that recent chaos in the scholarship program could undermine vital workforce-development efforts. Source link
Authorities from 21 countries took down 53 domains and arrested four people allegedly involved in distributed denial-of-service operations used by more than 75,000 cybercriminals, Europol…
Why is Glasswing still a big deal VulnCheck’s findings reframe Glasswing’s capabilities. The limited number of directly attributable CVEs is just one way of measuring…
Bluesky’s website and app are still struggling on Thursday after experiencing service interruptions that COO Rose Wang attributed to a denial-of-service attack. According to the…
Exposure management company Tenable announced a new OT asset discovery engine that enables security teams to quickly bring risks associated with cyber-physical systems (OT, IoT…
See how Tenable Hexa AI custom agents empower you to counter machine-speed threats by automating vulnerability remediation. Learn how the Model Context Protocol (MCP) automates…
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces. Attacks leveraging…
A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows processes,…