There comes a time in every digital leader’s career when they fancy doing something different. Keith Woolley has a strong…
Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data….
Android phones are vulnerable to attacks that could allow someone to takeover a device remotely without the device owner needing…
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of…
The Home Office’s mega £450m public cloud hosting contract with Amazon Web Services (AWS) is concerning public sector market watchers…
Daon announced the addition of xSentinel, an expansion of its AI.X technology. xSentinel provides adaptive synthetic voice protection to create…
Dec 07, 2023The Hacker NewsMobile Security / Vulnerability A critical Bluetooth security flaw could be exploited by threat actors to…
Thanks to artificial intelligence (AI) and, in particular, the hype surrounding generative AI (GenAI) and foundational models, server company execs…
Flashpoint’s latest report redefines the Vulnerability Management system and challenges the current standards set by CVE. Reaching a noteworthy milestone,…
Dec 07, 2023The Hacker NewsThreat Intelligence / Network Security Threat intelligence refers to gathering, processing, and analyzing cyber threats, along…
Back in July 2021, I wrote a piece for Computer Weekly on what security teams like mine needed to consider…
AI security researchers from Robust Intelligence and Yale University have designed a machine learning technique that can speedily jailbreak large…











