Samsung’s Galaxy S26 turns privacy into a visible and invisible feature
The Samsung Galaxy S26 series is out, offering plenty of security features that protect personal data while providing users with transparency and control over how…
The Samsung Galaxy S26 series is out, offering plenty of security features that protect personal data while providing users with transparency and control over how…
US artificial intelligence (AI) developers are sounding the alarm about “industrial scale” distillation attacks by Chinese labs looking to exfiltrate a variety of data from…
The Digital Transformation Agency (DTA) has signed the sixth volume sourcing agreement with Microsoft for license access to the vendor’s enterprise and cloud stacks. Spanning…
Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries Pierluigi Paganini February 26, 2026 Google and partners disrupted UNC2814, a…
Claude Code Vulnerabilities A critical security flaw in Anthropic’s Claude Code demonstrates how threat actors can exploit repository configuration files to execute malicious code and…
Hydra Saiga is running a long-running espionage campaign that abuses Telegram as command-and-control (C2) to infiltrate critical utilities in Central Asia and exfiltrate sensitive data…
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Pompelmi: Open-source secure file upload scanning for…
The cybersecurity threats of 2026 are expected to become more complex and harder to contain. keeping that in mind, Samsung SDS has released its assessment…
Optus will expand its headcount from around 6800 to 7500 employees within 12 months as it scrambles to insource its call centre and network operations.…
A proof-of-concept (PoC) exploit has been publicly released for CVE-2026-2636, a newly documented vulnerability in Windows’ Common Log File System (CLFS) driver that allows any low-privileged,…
Security researchers have released a new Proof of Concept (PoC) for a vulnerability in the Windows Common Log File System (CLFS) driver. The flaw, identified…
Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and parsing accuracy at the…