The Top Cybersecurity Predictions For 2026
Dan Lohrmann, internationally recognized cybersecurity leader, technologist, keynote speaker and author covered “The Top 26 Security Predictions for 2026” in Government Technology this week. “Cybersecurity…
Dan Lohrmann, internationally recognized cybersecurity leader, technologist, keynote speaker and author covered “The Top 26 Security Predictions for 2026” in Government Technology this week. “Cybersecurity…
Betty Brown, the oldest living victim of the Post Office scandal, was awarded an OBE in the 2026 New Year Honours List. She has been…
All of Hong Kong’s 28 retail banks, including virtual ones, will offer an anti-scam service from Wednesday that requires extra verification before money can be…
Lithuanian suspect arrested over KMSAuto malware that infected 2.8M systems Pierluigi Paganini December 30, 2025 A Lithuanian national was arrested for allegedly spreading KMSAuto malware…
SmarterTools has issued an urgent security advisory addressing a critical vulnerability in SmarterMail that could allow attackers to execute remote code on mail servers. The…
If you have downloaded the popular writing and coding tool EmEditor recently, you might want to double-check your computer. Between December 19 and December 22,…
CISA has added a critical MongoDB Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively exploited in cyberattacks.…
The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a modular remote…
Throughout 2025, Computer Weekly’s technology and ethics coverage highlighted the human and socio-technical impacts of data-driven systems, particularly artificial intelligence (AI). This included a number…
A critical zero-day vulnerability has been discovered in XSpeeder’s SXZOS firmware, affecting tens of thousands of SD-WAN appliances, edge routers, and smart TV controllers deployed…
This blog is part of a series where we highlight new or fast-evolving threats in the consumer security landscape. This one looks at how the…
Artificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early experimentation into consistent operational value.…