Rapid7 researchers have attributed the recent hijacking of the Notepad++ update mechanism to Lotus Blossom (aka Billbug), a Chinese state-sponsored…
Organisations using vSphere 8 have until October 2027 to migrate to vSphere 9 before product support ends, with additional costs…
French prosecutors have raided X’s offices in Paris on Tuesday as part of a criminal investigation into the platform’s Grok…
The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over…
Hikvision has disclosed a high-severity command execution vulnerability affecting multiple wireless access point models, potentially allowing authenticated attackers to execute…
The Everest ransomware group has claimed responsibility for a data breach involving systems linked to Polycom, a legacy enterprise communications…
OpenAI has launched the new Codex app for macOS, a dedicated workspace for managing multiple AI coding agents in parallel….
Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer…
The UK is beginning 2026 with big artificial intelligence (AI) ambitions, but without a clear approach to the data that…
APT28 exploits Microsoft Office flaw in Operation Neusploit Pierluigi Paganini February 03, 2026 Russia-linked APT28 is behind Operation Neusploit, exploiting…
TL;DR We’re launching Internal Scanning, bringing our proprietary security engines, research-led crawling and fuzzing engine for internal vulnerability scanning behind…
Hong Kong’s banking regulator has unveiled four flagship projects, including a quantum computing readiness index, to help the city’s lenders…