India Scraps Mandatory App Preinstall Following Industry Pushback

The reversal comes just 48 hours after reports surfaced that Apple refused to comply with the order to preload the government’s Sanchar Saathi app. The post India Scraps Mandatory... Read more »

King Addons flaw lets anyone become WordPress admin

Hackers are exploiting a King Addons flaw (CVE-2025-8489) that lets anyone register and instantly gain admin privileges on WordPress sites. Hackers are exploiting a critical vulnerability, tracked as CVE-2025-8489... Read more »

University of Pennsylvania and University of Phoenix disclose data breaches

The University of Pennsylvania and the University of Phoenix confirm they were hit in the Oracle E-Business Suite hacking campaign. The University of Pennsylvania (Penn) and the University of... Read more »

In 2026, collaboration, honesty and humility in cyber are key

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Read more »

UK government pledges to rewrite Computer Misuse Act

Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect security professionals from prosecution. Read more »

NCSC and BT block a billion dangerous clicks

A protective service jointly-developed by the NCSC and BT has disrupted over a billion potential cyber incidents by stopping members of the public from clicking through to dangerous websites. Read more »

Salt Security identifies external misuse and abuse of MCP servers by AI agents

Salt Security announced it is extending its API behavioral threat protection to detect and block malicious intent targeting Model Context Protocol (MCP) servers deployed within the AWS ecosystem. Building... Read more »

Bitwarden Access Intelligence helps enterprises take action on risky credentials

Bitwarden announced Bitwarden Access Intelligence for Enterprise plans. Access Intelligence provides visibility into weak, reused, or exposed credentials across critical applications, with guided remediation workflows for consistent credential updates... Read more »

Researchers spotted Lazarus’s remote IT workers in action

Researchers exposed a Lazarus scheme using remote IT workers tied to North Korea’s Famous Chollima APT group in a joint investigation. Researchers filmed Lazarus APT group’s remote-worker scheme in... Read more »

Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say

A sprawling network that’s seemingly maintained to serve (illegal) online gambling opportunities and deliver malware to Indonesian citizens is likely also being used to provide threat actors command and... Read more »
Subscribe to our Newsletter