The Investigatory Powers Act 2016 (IPA 2016), now 10 years’ old, is seriously out of date. It provides the main…
French authorities raided the Paris headquarters of Elon Musk’s social media platform X today, escalating a year-old cybercrime probe into…
The Russia-linked advanced persistent threat group APT28 has been observed actively exploiting a zero-day vulnerability in Microsoft Office to deliver…
Everything you always wanted to know about penetration testing but were afraid to ask can be found in a widely popular blog post…
Rapid7 researchers have attributed the recent hijacking of the Notepad++ update mechanism to Lotus Blossom (aka Billbug), a Chinese state-sponsored…
Organisations using vSphere 8 have until October 2027 to migrate to vSphere 9 before product support ends, with additional costs…
French prosecutors have raided X’s offices in Paris on Tuesday as part of a criminal investigation into the platform’s Grok…
The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over…
Hikvision has disclosed a high-severity command execution vulnerability affecting multiple wireless access point models, potentially allowing authenticated attackers to execute…
The Everest ransomware group has claimed responsibility for a data breach involving systems linked to Polycom, a legacy enterprise communications…
OpenAI has launched the new Codex app for macOS, a dedicated workspace for managing multiple AI coding agents in parallel….
Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer…
