Google Expands ‘Results About You’ to Shield IDs, Fight Deepfake Abuse

Google expands its “Results about you” tool to remove sensitive IDs and explicit images from Search, strengthening privacy protections amid rising identity theft. The post Google Expands ‘Results About... Read more »

From 10M to 25M: Conduent Breach Balloons Into One of 2025’s Largest

The Conduent ransomware attack has grown to impact 25 million Americans, exposing Social Security numbers and medical data in one of 2025’s largest breaches. The post From 10M to... Read more »

CVE volumes may plausibly reach 100,000 this year

The number of vulnerabilities to be disclosed in 2026 is almost certain to exceed last year’s total, and may be heading towards 100,000, according to new analysis. Read more »

Waikiki Drone Plan Sparks Privacy Pushback

Hawaii plans to use “first responder” drones in Waikiki to reach crime scenes and emergencies faster, and privacy advocates are sounding the alarm. The post Waikiki Drone Plan Sparks... Read more »

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally... Read more »

Reynolds ransomware uses BYOVD to disable security before encryption

Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection before encryption. Researchers found a new ransomware, named Reynolds, that implements the Bring Your... Read more »

Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells

A massive wave of exploitation attempts has followed the disclosure of CVE-2026-1281, a critical pre-authentication Ivanti EPMM vulnerability, the Shadowserver Foundation has warned. Some of it is automated scanning... Read more »

CodeHunter expands behavioral intent analysis to secure the software supply chain

CodeHunter is expanding its behavioral intent technology beyond traditional malware analysis to address supply chain risk and security decision-making across the software development lifecycle (SDLC). According to a recent... Read more »

Microsoft begins Secure Boot certificate update for Windows devices

Microsoft has begun updating Secure Boot certificates originally issued in 2011 to ensure that Windows devices continue to verify boot software as older certificates reach the end of their... Read more »

Kong launches Context Mesh to turn enterprise APIs into agent-ready tools

Kong has announced Kong Context Mesh, a product that automatically discovers enterprise APIs, transforms them into agent-consumable tools, and deploys them with runtime governance. “Organisations have spent years building... Read more »
Subscribe to our Newsletter