US wants to push its view of AI cybersecurity standards to the rest of the world
The U.S. government wants the rest of the world to adopt its artificial intelligence cybersecurity standards, a top official with the Office of the National…
The U.S. government wants the rest of the world to adopt its artificial intelligence cybersecurity standards, a top official with the Office of the National…
Matanbuchus is once again drawing attention in the cybersecurity community as it quietly returns to the threat landscape with refined tactics and better tools to…
In the evolving landscape of cyber threats, attackers increasingly leverage Python to develop sophisticated Remote Access Trojans (RATs) that evade traditional security controls. Python’s widespread…
The Digital Transformation Agency (DTA) is on the hunt for a digital governance and risk expert to set up and manage Labor’s promised whole-of-government AI…
SolarWinds addressed four critical Web Help Desk flaws Pierluigi Paganini January 29, 2026 SolarWinds patched six Web Help Desk vulnerabilities, including four critical flaws exploitable…
The U.S. government wants the rest of the world to adopt its artificial intelligence cybersecurity standards, a top official with the Office of the National…
IPIDEA, one of the largest residential proxy networks used by threat actors, was disrupted earlier this week by Google Threat Intelligence Group (GTIG) in collaboration…
A malicious VS Code extension has surfaced in the digital threat landscape, targeting developers who rely on coding tools daily. Discovered on January 27, 2026,…
France’s government has made a decisive move to eliminate foreign videoconferencing platforms from its operations, rejecting Zoom and Microsoft Teams in favor of a domestically…
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast “unmanaged, publicly accessible…
Westpac’s group chief technology officer of six-and-a-half years David Walker has left the bank, with his responsibilities divvied up among existing and new technology leaders.…
Threat researchers have uncovered an actively serving command and control server hosting a complete deployment of the BYOB framework following the discovery of an exposed…