Subpostmasters who suffered at the hands of errors in the Post Office’s Capture software, like Horizon users, are receiving derisory…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…
A new Android threat campaign has emerged that uses social engineering combined with a legitimate machine learning platform to spread…
A sophisticated Android RAT campaign that exploits Hugging Face’s popular machine learning platform to host and distribute malicious payloads. Attackers…
30 Jan Cybersecurity Predictions for 2026 Posted at 10:57h in Blogs by Taylor Fox Six Predictions for the AI-Driven SOC…
As U.S. manufacturing firms weather a constant barrage of cyberattacks, the various industries in that sector — which underpin everything…
Millions of devices used as proxies by cybercriminals, espionage groups and data thieves have been removed from circulation following Google’s…
A new wave of targeted attacks has emerged against Internet Information Services (IIS) servers across Asia, with threat actors deploying…
A dangerous wave of attacks exploiting CVE-2025-54236, dubbed “SessionReaper,” in Magento e-commerce platforms. This vulnerability lets attackers bypass authentication by…
Researchers at Zimperium zLabs have identified Arsink, a dangerous Android Trojan that impersonates 50+ popular brands, including WhatsApp and TikTok….
Uncertainty about what the future holds for the Police Digital Service (PDS) continues, despite the UK government confirming the organisation is…
Microsoft has fixed a known issue that prevented Microsoft 365 customers from opening encrypted emails in classic Outlook after a…

