The financial sector is under increasing pressure to strengthen its defences against cyber threats. With digital transformation accelerating, financial institutions…
AI search service Perplexity AI doesn’t just want you using its app—it wants to take over your web browsing experience…
A sophisticated malware variant masquerading as a legitimate WordPress security plugin has been identified, capable of providing attackers with persistent…
As quantum computing transitions from theoretical research to practical application, Chief Information Security Officers (CISOs) face an unprecedented challenge to…
Telecommunications are the lifeblood of the modern world, connecting billions of people and devices. This makes them a prime target for…
Researchers found a set of vulnerabilities in Apple’s AirPlay SDK that put billions of users at risk of their devices…
May 01, 2025Ravie LakshmananArtificial Intelligence / Disinformation Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its…
Microsoft is preparing to increase its European datacentre capacity by 40% over the next two years and will appoint a…
In today’s hyper-connected business environment, supply chains are no longer just about the physical movement of goods they are digital…
A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own hacking competition, allows attackers to execute…
A misconfigured, non-password-protected database belonging to TicketToCash exposed data from 520,000 customers, including PII and partial financial details. Cybersecurity researcher…
In an online world filled with extraordinarily sophisticated cyberattacks—including organized assaults on software supply chains, state-directed exploitations of undiscovered vulnerabilities,…










