Apple encryption row: Does law enforcement need to use Technical Capability Notices?
03
Feb
2026

Why the UK needs to rethink the Investigatory Powers Act and allow intercept evidence in court

The Investigatory Powers Act 2016 (IPA 2016), now 10 years’ old, is seriously out of date. It provides the main…

French Authorities Raid X Office Following Cybercrime Allegations
03
Feb
2026

French Authorities Raid X Office Following Cybercrime Allegations

French authorities raided the Paris headquarters of Elon Musk’s social media platform X today, escalating a year-old cybercrime probe into…

APT28 Exploits Active Microsoft Office Zero-Day to Deliver Malware
03
Feb
2026

APT28 Exploits Active Microsoft Office Zero-Day to Deliver Malware

The Russia-linked advanced persistent threat group APT28 has been observed actively exploiting a zero-day vulnerability in Microsoft Office to deliver…

AI-Powered Deepfake Scams Are A Pain In The Wallet
03
Feb
2026

What is Autonomous Penetration Testing and How Does it Work?

Everything you always wanted to know about penetration testing but were afraid to ask can be found in a widely popular blog post…

03
Feb
2026

Notepad++ supply chain attack: Researchers reveal details, IoCs, targets

Rapid7 researchers have attributed the recent hijacking of the Notepad++ update mechanism to Lotus Blossom (aka Billbug), a Chinese state-sponsored…

VMware vSphere 8 end-of-support challenges
03
Feb
2026

VMware vSphere 8 end-of-support challenges

Organisations using vSphere 8 have until October 2027 to migrate to vSphere 9 before product support ends, with additional costs…

X (formerly known as Twitter)
03
Feb
2026

French prosecutors raid X offices, summon Musk over Grok deepfakes

French prosecutors have raided X’s offices in Paris on Tuesday as part of a criminal investigation into the platform’s Grok…

Microsoft to Disable NTLM by Default as a Step Towards More Secure Authentication
03
Feb
2026

Microsoft to Disable NTLM by Default as a Step Towards More Secure Authentication

The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over…

Hikvision Wireless AP Flaw Could Let Attackers Run Arbitrary Commands
03
Feb
2026

Hikvision Wireless AP Flaw Could Let Attackers Run Arbitrary Commands

Hikvision has disclosed a high-severity command execution vulnerability affecting multiple wireless access point models, potentially allowing authenticated attackers to execute…

Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
03
Feb
2026

Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems – Hackread – Cybersecurity News, Data Breaches, AI, and More

The Everest ransomware group has claimed responsibility for a data breach involving systems linked to Polycom, a legacy enterprise communications…

03
Feb
2026

OpenAI releases Codex macOS app for agent-based software development

OpenAI has launched the new Codex app for macOS, a dedicated workspace for managing multiple AI coding agents in parallel….

location tracking
03
Feb
2026

Apple’s new iOS setting addresses a hidden layer of location tracking

Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer…