CISO tenures average just 18 to 26 months, compared with nearly five years for the broader C-suite, according to the…
Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range…
Fujitsu will respond to the Post Office statutory public inquiry’s part 1 report by Friday this week, with details of…
Researchers have uncovered a 13-year-old critical remote-code-execution flaw in Redis that let attackers escape the product’s Lua sandbox and execute…
The WARMCOOKIE backdoor first surfaced in mid-2024, delivered primarily via recruiting-themed phishing campaigns that coaxed victims into executing malicious documents….
A security issue in the Kibana CrowdStrike Connector allows attackers to access stored CrowdStrike credentials. The flaw affects multiple versions…
OPSWAT launched MetaDefender Drive with Smart Touch, a portable cybersecurity device designed for malware and compliance scanning of transient cyber…
For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not…
A pledge by the shadow home secretary, Andrew Griffith, to “look again” at reforming the controversial IR35 disguised employment legislation…
Forty cybersecurity merger and acquisition (M&A) deals were announced in September 2025. An analysis conducted by SecurityWeek shows that 405…
Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…
An extortion group calling itself Crimson Collective claimed responsibility for a major breach at Red Hat Consulting. With only 22…











