Print Friendly, PDF & Email
01
May
2025

DORA compliance – Why financial firms can’t afford to fall behind

The financial sector is under increasing pressure to strengthen its defences against cyber threats. With digital transformation accelerating, financial institutions…

Footprint in the sand
01
May
2025

What privacy? Perplexity wants your data, builds browser to track you and serve ads

AI search service Perplexity AI doesn’t just want you using its app—it wants to take over your web browsing experience…

New WordPress Malware as Anti-Malware Plugin Take Full Control of Website
01
May
2025

New WordPress Malware as Anti-Malware Plugin Take Full Control of Website

A sophisticated malware variant masquerading as a legitimate WordPress security plugin has been identified, capable of providing attackers with persistent…

Quantum Computing and Cybersecurity - What CISOs Need to Know Now
01
May
2025

Quantum Computing and Cybersecurity – What CISOs Need to Know Now

As quantum computing transitions from theoretical research to practical application, Chief Information Security Officers (CISOs) face an unprecedented challenge to…

Why telecoms need a proactive AI defense
01
May
2025

Why telecoms need a proactive AI defense

Telecommunications are the lifeblood of the modern world, connecting billions of people and devices. This makes them a prime target for…

patched Apple
01
May
2025

Apple AirPlay SDK devices at risk of takeover—make sure you update

Researchers found a set of vulnerabilities in Apple’s AirPlay SDK that put billions of users at risk of their devices…

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign
01
May
2025

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

May 01, 2025Ravie LakshmananArtificial Intelligence / Disinformation Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its…

Microsoft commits to European datacentre footprint growth despite ‘geopolitical volatility’
01
May
2025

Microsoft commits to European datacentre footprint growth despite ‘geopolitical volatility’

Microsoft is preparing to increase its European datacentre capacity by 40% over the next two years and will appoint a…

Supply Chain Cybersecurity - CISO Risk Management Guide
01
May
2025

Supply Chain Cybersecurity – CISO Risk Management Guide

In today’s hyper-connected business environment, supply chains are no longer just about the physical movement of goods they are digital…

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code
01
May
2025

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own hacking competition, allows attackers to execute…

Ticket Resale Platform TicketToCash Left 200GB of User Data Exposed
01
May
2025

Ticket Resale Platform TicketToCash Left 200GB of User Data Exposed

A misconfigured, non-password-protected database belonging to TicketToCash exposed data from 520,000 customers, including PII and partial financial details. Cybersecurity researcher…

Several locks presented in a row, with the lock in the middle broken in half
01
May
2025

The 3 biggest cybersecurity threats to small businesses

In an online world filled with extraordinarily sophisticated cyberattacks—including organized assaults on software supply chains, state-directed exploitations of undiscovered vulnerabilities,…