Resecurity Went on the Cyber Offensive – When ‘Shiny Objects’ trick ‘Shiny Hunters’

Resecurity released 105 pages with 1,000+ messages tied to hacker John Erin Binns, detailing contacts with an unnamed woman in Turkey and an associate called “S.M.” Resecurity released 105... Read more »

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign codenamed DarkSpectre that has impacted 2.2 million users of... Read more »

Privacy will be under unprecedented attack in 2026

The UK and Europe are ramping up opposition to encryption and stepping up surveillance of private communications. Here is what to expect this year Read more »

Will there be a technology policy epiphany in 2026?

The UK government faces many complex technology policy decisions in the year ahead, which could reshape the country for a digital, AI-led future Read more »

Results and prospects for AI in business applications in 2026

Agentic AI dominated enterprise IT discourse in 2025, evolving from generative AI. In 2026, AI convergence and governance will determine AI’s impact on enterprise IT Read more »

Turning plain language into firewall rules

Firewall rules often begin as a sentence in someone’s head. A team needs access to an application. A service needs to be blocked after hours. Translating those ideas into... Read more »

The roles and challenges in moving to quantum-safe cryptography

A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study draws on a structured workshop with public sector, private... Read more »

Product showcase: Blokada for Android gives users control over network traffic

Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections... Read more »

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses... Read more »

Passwords are still breaking compliance programs

The security stack has grown, but audits still stumble on passwords. CISOs see this every year. An organization may have strong endpoint tools, layered network defenses, and a documented... Read more »
Subscribe to our Newsletter