The latest filings in Tesco’s £100m lawsuit against Broadcom and VMware over an alleged breach in software licensing terms demonstrates…
A sophisticated phishing campaign is actively exploiting LinkedIn’s trusted social media platform to distribute a dangerous remote access trojan to…
Carlsberg Group, a Danish multinational brewer, is in the news for unexpected reasons after a cybersecurity researcher uncovered a vulnerability…
Gartner® doesn’t create new categories lightly. Generally speaking, a new acronym only emerges when the industry’s collective “to-do list” has…
The UK government has named senior tech executives from two banks to champion and guide the adoption of artificial intelligence…
Crooks impersonate LastPass in campaign to harvest master passwords Pierluigi Paganini January 21, 2026 Password manager LastPass warns of an…
Threat actors are leveraging a dangerous new campaign that weaponizes ordinary-looking shipping documents to distribute Remcos, a powerful remote access…
The UK’s National Cyber Security Centre reports ongoing cyber operations by Russian-aligned hacktivist groups targeting organizations in the UK and…
The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person…
Microsoft is rolling out a new security feature called the External Domains Anomalies Report for Teams, designed to help IT…
Cryptocurrency thieves have found a new way to turn trusted software packages for Linux on the Snap Store into crypto-stealing…
Ravie LakshmananJan 21, 2026Vulnerability / Artificial Intelligence Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit…