DTA signs sixth iteration of Microsoft licensing deal
The Digital Transformation Agency (DTA) has signed the sixth volume sourcing agreement with Microsoft for license access to the vendor’s enterprise and cloud stacks. Spanning…
The Digital Transformation Agency (DTA) has signed the sixth volume sourcing agreement with Microsoft for license access to the vendor’s enterprise and cloud stacks. Spanning…
Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries Pierluigi Paganini February 26, 2026 Google and partners disrupted UNC2814, a…
Claude Code Vulnerabilities A critical security flaw in Anthropic’s Claude Code demonstrates how threat actors can exploit repository configuration files to execute malicious code and…
Hydra Saiga is running a long-running espionage campaign that abuses Telegram as command-and-control (C2) to infiltrate critical utilities in Central Asia and exfiltrate sensitive data…
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Pompelmi: Open-source secure file upload scanning for…
The cybersecurity threats of 2026 are expected to become more complex and harder to contain. keeping that in mind, Samsung SDS has released its assessment…
Optus will expand its headcount from around 6800 to 7500 employees within 12 months as it scrambles to insource its call centre and network operations.…
A proof-of-concept (PoC) exploit has been publicly released for CVE-2026-2636, a newly documented vulnerability in Windows’ Common Log File System (CLFS) driver that allows any low-privileged,…
Security researchers have released a new Proof of Concept (PoC) for a vulnerability in the Windows Common Log File System (CLFS) driver. The flaw, identified…
Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and parsing accuracy at the…
Anthropic has unveiled a significant update to its Claude Code platform, introducing a new “Remote Control” feature. This capability allows developers to manage terminal sessions…
Digital Forensics, Investigation, and Response, 5th Edition presents a structured survey of the digital forensics discipline. The book spans foundational principles, platform specific analysis, specialized…