Accenture helps organizations advance agentic AI with Gemini Enterprise

Accenture and Google Cloud announced that their strategic alliance is driving client reinvention with Gemini Enterprise agentic AI solutions, building on the successful adoption of Google Cloud technologies for... Read more »

Proof launches Certify, the cryptographic answer to AI-generated fraud

Generative AI is enabling the proliferation of fake documents, images, videos, and data at an unprecedented scale, to the point where it’s indistinguishable from reality. While fake media and... Read more »

Apple offers $2 million for zero-click exploit chains

Apple bug bounty program’s categories are expanding and rewards are rising, and zero-click exploit chains may now earn researchers up to $2 million. “Our bonus system, providing additional rewards... Read more »

comforte AG debuts TAMUNIO, its all-in-one shield for data security

comforte AG launched TAMUNIO, a unified data security platform designed to reduce risk, accelerate innovation with cloud and AI, and optimize operational costs for the most demanding enterprises. Built... Read more »

Beyond the refresh: Your cyber strategy must include AI PCs

Viewing a PC refresh as part of an organisation’s security strategy helps build a more resilient and productive enterprise and is an opportunity to move beyond tactical yupgrades to... Read more »

Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)

CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited by attackers in the wild. While Gladinet is aware... Read more »

U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Grafana flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Grafana flaw, tracked as CVE-2021-43798 (CVSS score... Read more »

RondoDox Botnet targets 56 flaws across 30+ device types worldwide

RondoDox botnet exploits 56 known flaws in over 30 device types, including DVRs, CCTV systems, and servers, active globally since June. Trend Micro researchers reported that the RondoDox botnet... Read more »

October 2025 Patch Tuesday forecast: The end of a decade with Microsoft

A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after nearly a decade of service. Not far... Read more »

From theory to training: Lessons in making NICE usable

SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from Cleveland State University looked at how these companies could... Read more »
Subscribe to our Newsletter