Home Affairs signs $25m biometrics renewal with Unisys
Home Affairs has extended its use of Unisys’ biometrics platform, signing a new three-year deal worth $25 million. The department first brought Unisys on board…
Home Affairs has extended its use of Unisys’ biometrics platform, signing a new three-year deal worth $25 million. The department first brought Unisys on board…
Brave Software says its privacy-focused browser will block Microsoft’s Windows Recall from capturing screenshots of Brave windows by default to protect users’ privacy. Windows Recall is…
Cybercriminals have evolved their social engineering tactics with a sophisticated malware campaign that exploits users’ trust in financial institutions. The latest threat involves a malicious…
U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog Pierluigi Paganini July 23,…
Hundreds of organizations around the world suffered data breaches this week, as an array of hackers rushed to exploit a recently discovered vulnerability in older…
Sophos fixed two critical Sophos Firewall vulnerabilities Pierluigi Paganini July 23, 2025 Sophos addressed five Sophos Firewall vulnerabilities that could allow remote attackers to execute…
npm has taken down all versions of the real Stylus library and replaced them with a “security holding” page, breaking pipelines and builds worldwide that rely on the…
A critical security vulnerability has been discovered in the widely-used JavaScript form-data library, potentially exposing millions of applications to code execution attacks. The vulnerability, assigned…
The Open Worldwide Application Security Project (OWASP) has earned a reputation as a trusted authority in application security. Its most widely recognised contribution, the OWASP…
Britain and ChatGPT maker OpenAI have signed a new strategic partnership to deepen collaboration on artificial intelligence security research and explore investment in the country’s…
CISA has warned that attackers are actively exploiting two security vulnerabilities in the SysAid IT service management (ITSM) software to hijack administrator accounts. The two…
The brief lull following May’s multinational takedown of the Lumma Stealer infrastructure proved deceptive. Within weeks, telemetry again lit up with fresh command-and-control (C2) beacons,…