Balancing IT security with AI and cloud innovation
Organisations increasingly rely on cloud services to drive innovation and operational efficiency, and as more artificial intelligence (AI) workloads use...
Read more →Organisations increasingly rely on cloud services to drive innovation and operational efficiency, and as more artificial intelligence (AI) workloads use...
Read more →Fortra has released patches for a critical-severity vulnerability in the GoAnywhere secure managed file transfer (MFT) software that could be...
Read more →A sophisticated cyber-attack campaign exploiting GitHub Pages to distribute the notorious Atomic stealer malware to macOS users. The threat actors...
Read more →A sophisticated malware campaign is targeting Mac users through fraudulent GitHub repositories that masquerade as legitimate software downloads, with threat...
Read more →The OpenID Foundation (OIDF) has approved three Final Specifications, establishing the first global standards for real-time security event sharing across...
Read more →September 19, 2025 – OpenAI has fixed a vulnerability in ChatGPT Deep Research after researchers found a prompt injection method...
Read more →Beware: GitHub repos distributing Atomic Infostealer on macOS Pierluigi Paganini September 22, 2025 LastPass warns macOS users of fake GitHub...
Read more →A sophisticated attack technique called LNK Stomping is enabling cybercriminals to bypass Windows security protections designed to block malicious files downloaded from...
Read more →Cybersecurity AI (CAI) is an open-source framework that helps security teams build and run AI-driven tools for offensive and defensive...
Read more →A sophisticated new ransomware operation dubbed BlackLock has emerged as a significant threat to organizations worldwide, demonstrating advanced cross-platform capabilities...
Read more →Almost immediately after the cyberattack, a group on Telegram called Scattered Lapsus$ Hunters, claimed responsibility for the hack. The group...
Read more →Cybersecurity researchers have identified a concerning development in the underground cybercrime marketplace: a sophisticated Remote Access Trojan (RAT) being marketed...
Read more →