UK’s AI plan of action needs to shift into overdrive
Twelve months after Labour’s 50-point plan of action to stimulate the UK’s artificial intelligence (AI)-enabled economy, a new report shows billions of pounds are being…
Twelve months after Labour’s 50-point plan of action to stimulate the UK’s artificial intelligence (AI)-enabled economy, a new report shows billions of pounds are being…
A 16-year-old Microsoft PowerPoint flaw and a new maximum-severity HPE vulnerability are the latest additions to CISA’s Known Exploited Vulnerabilities (KEV) catalog. CVE-2025-37164 is a…
Public PoC prompts Cisco patch for ISE, ISE-PIC vulnerability Pierluigi Paganini January 08, 2026 Cisco addressed a medium-severity vulnerability in ISE and ISE-PIC after a…
Aloha I hope you had an awesome holiday break and great start to the new year! I spent a few weeks with my family in…
A dangerous hacking group known as UAT-7290 has been actively attacking important telecommunications companies and critical infrastructure targets across South Asia since at least 2022.…
Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia…
AI promises to exponentially improve innovation and efficiency for businesses of all kinds, but it’s also ushering in a new age of cyberthreats. Nearly 9…
As we kick off 2026, cybersecurity is undergoing rapid transformation. In just the past year, we’ve seen a surge in attacks driven by advances in…
A new phishing wave is abusing fake DocuSign notifications to drop stealthy malware on Windows systems. The emails copy real DocuSign branding and urge users…
The US Cybersecurity and Infrastructure Security Agency (CISA) added both a newly discovered flaw and a much older one to its catalog of Known Exploited…
‘AI-powered’ security tools are already everywhere, and 2026 will only make that more apparent. The question I hear from CISOs is never “Should we be…
As collective disgust has continued to build over the widespread generation and sharing of nonconsensual, sexualized deepfakes generated by X’s GrokAI tool, angry onlookers have…