Atos boss ‘utterly determined’ not to allow GenAI to pull up career drawbridge
Michael Herron, the UK head at French IT service provider Atos, has told Computer Weekly that ensuring future talent can get on the first rung…
Michael Herron, the UK head at French IT service provider Atos, has told Computer Weekly that ensuring future talent can get on the first rung…
Amelia Coen | 22 October 2025 at 13:15 UTC In her latest video, CyberMaddy dives into the world of AI-driven ethical hacking, exploring how Burp…
Experts and officials at a major cybersecurity summit in Singapore have called for deeper collaboration between governments and tech giants, warning that fragmented efforts are…
GitLab has urgently released patch versions 18.5.1, 18.4.3, and 18.3.5 for its Community Edition (CE) and Enterprise Edition (EE) to address multiple critical security flaws,…
CyberProof researchers detected a significant surge in Remcos (Remote Control & Surveillance Software) campaigns throughout September and October 2025, exploiting sophisticated fileless techniques to evade…
Rubrik announced the launch of the Rubrik Agent Cloud to accelerate enterprise AI agent adoption while managing risk of AI deployments. AI transformation is now…
Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications…
In this podcast, we talk to Axel Stoermann, Kioxia’s vice-president and chief technology officer for memory and solid-state disk (SSD) products in Europe, about energy efficiency…
Amelia Coen | 22 October 2025 at 12:59 UTC What happens when you set Burp AI loose on a deliberately vulnerable web app? In his…
Oracle has disclosed two critical vulnerabilities in its E-Business Suite’s Marketing product that could hand full control to remote attackers. Dubbed CVE-2025-53072 and CVE-2025-62481, these…
SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism for command-and-control (C2) communications. By…
The top 50 cybersecurity companies of 2025 are recognized by Evolution Equity Partners for their monumental undertaking to shape the future of cybersecurity, a shared vision that…