Why boards should be obsessed with their most 'boring' systems
05
Feb
2026

Why boards should be obsessed with their most ‘boring’ systems

Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the…

Zendesk
05
Feb
2026

Zendesk spam wave returns, floods users with ‘Activate account’ emails

A fresh wave of spam is hitting inboxes worldwide, with users reporting that they are once again being bombarded by…

Beware of Weaponized Voicemail Messages Granting Hackers Remote Access to Your System
05
Feb
2026

Beware of Weaponized Voicemail Messages Granting Hackers Remote Access to Your System

Cybercriminals are increasingly shifting tactics toward social engineering to bypass traditional security defenses, catching many users off guard. A sophisticated…

Go 1.25.7 and Go 1.24.13 Released With Patches for Multiple Security Vulnerabilities
05
Feb
2026

Go 1.25.7 and Go 1.24.13 Released With Patches for Multiple Security Vulnerabilities

The Go team has officially released versions 1.25.7 and 1.24.13. These minor point releases address two distinct security vulnerabilities affecting the cmd/cgo command and the crypto/tls library….

Post Office offered bailout to cover £104.4m IR35 tax bill linked to Horizon IT scandal
05
Feb
2026

Post Office offered bailout to cover £104.4m IR35 tax bill linked to Horizon IT scandal

A document, published on the Competition and Markets Authority’s (CMA) pages on the Gov.uk website late last month, confirmed the…

China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025
05
Feb
2026

China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025

China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025 Pierluigi Paganini February 05, 2026 China-linked hackers tracked as Amaranth-Dragon targeted…

Cisco Meeting Management Vulnerability Let Remote Attacker Upload Arbitrary Files
05
Feb
2026

Cisco Meeting Management Vulnerability Let Remote Attacker Upload Arbitrary Files

Cisco Meeting Management Vulnerability A high-severity security advisory has been issued for a critical vulnerability in Meeting Management software. This…

DragonForce Ransomware Targets Critical Businesses to Exfiltrate Sensitive Data
05
Feb
2026

DragonForce Ransomware Targets Critical Businesses to Exfiltrate Sensitive Data

DragonForce is a ransomware group that emerged in late 2023 and has grown into a serious threat to businesses by…

05
Feb
2026

Microsoft brings project-focused AI agents into OneDrive

Teams often rely on shared document collections to track project history, decisions, and operational knowledge. To support this workflow, Microsoft…

05
Feb
2026

Critical N8n Vulnerability CVE-2026-25049 Enables RCE

A newly disclosed critical vulnerability,  tracked as CVE-2026-25049, in the workflow automation platform n8n, allows authenticated users to execute arbitrary…

global bug bounty adoption accelerates, led by the U.S.
05
Feb
2026

global bug bounty adoption accelerates, led by the U.S.

Bug bounty programs have evolved from a niche security tactic into a core component of modern defense strategies worldwide. In this blog, we focus…

Beware of Fake Traffic Ticket Portals that Harvest Your PII and Credit Card Data
05
Feb
2026

Beware of Fake Traffic Ticket Portals that Harvest Your PII and Credit Card Data

A sophisticated phishing campaign targeting Canadian citizens has emerged, using fake traffic ticket payment portals to steal personal and financial…