Why the UK needs to rethink the Investigatory Powers Act and allow intercept evidence in court
The Investigatory Powers Act 2016 (IPA 2016), now 10 years’ old, is seriously out of date. It provides the main legal framework within which the…
The Investigatory Powers Act 2016 (IPA 2016), now 10 years’ old, is seriously out of date. It provides the main legal framework within which the…
French authorities raided the Paris headquarters of Elon Musk’s social media platform X today, escalating a year-old cybercrime probe into alleged algorithmic manipulation and illicit…
The Russia-linked advanced persistent threat group APT28 has been observed actively exploiting a zero-day vulnerability in Microsoft Office to deliver malware through a sophisticated multi-stage…
Everything you always wanted to know about penetration testing but were afraid to ask can be found in a widely popular blog post from BreachLock, a leading vendor…
Rapid7 researchers have attributed the recent hijacking of the Notepad++ update mechanism to Lotus Blossom (aka Billbug), a Chinese state-sponsored group known for targeting organizations…
Organisations using vSphere 8 have until October 2027 to migrate to vSphere 9 before product support ends, with additional costs needing to be considered beyond…
French prosecutors have raided X’s offices in Paris on Tuesday as part of a criminal investigation into the platform’s Grok AI tool, widely used to…
The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over three decades, is being accelerated.…
Hikvision has disclosed a high-severity command execution vulnerability affecting multiple wireless access point models, potentially allowing authenticated attackers to execute arbitrary commands on affected devices.…
The Everest ransomware group has claimed responsibility for a data breach involving systems linked to Polycom, a legacy enterprise communications brand that was acquired by…
OpenAI has launched the new Codex app for macOS, a dedicated workspace for managing multiple AI coding agents in parallel. The app is designed to…
Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer of location tracking that operates…