Thousands of women in tech leave their roles each year
A lack of opportunity for progression is a main reason why women are leaving the technology sector, according to the Lovelace report. Research by Oliver…
A lack of opportunity for progression is a main reason why women are leaving the technology sector, according to the Lovelace report. Research by Oliver…
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised Windows systems. LameHug was…
A sophisticated new attack vector where malicious actors are hiding malware inside DNS records, exploiting a critical blind spot in most organizations’ security infrastructure. This…
Cybersecurity researchers at Seqrite Labs have identified a sophisticated espionage group designated as UNG0002 (Unknown Group 0002) that has been conducting persistent campaigns across multiple…
With the Bristol Isambard-AI supercomputer now live, the UK government has unveiled a roadmap to delivering 420 Exaflops of compute power by 2030. The £1bn…
The global hacktivist landscape has undergone a dramatic transformation since 2022, evolving from primarily ideologically motivated actors into a complex ecosystem where attention-seeking behavior and…
Proofpoint Threat Research has identified a sophisticated multi-pronged cyberespionage campaign targeting Taiwan’s semiconductor industry between March and June 2025. Three distinct Chinese state-sponsored threat actors,…
In recent months, some of the UK’s most recognisable retailers, including M&S, Co-op and North Face have found themselves in the cybersecurity spotlight, for all…
A multinational cyber enforcement operation – led by the European Union’s (EU’s) Europol and Eurojust agencies – has successfully disrupted the NoName057(16) pro-Russian hacktivist cyber…
Stormous Ransomware gang targets North Country HealthCare, claims 600K patient data stolen Pierluigi Paganini July 17, 2025 Ransomware group Stormous claims it stole data from…
A critical vulnerability (CVE-2025-20337) in Cisco’s Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges…
The H2Miner botnet, first observed in late 2019, has resurfaced with an expanded arsenal that blurs the line between cryptojacking and ransomware. The latest campaign…