Ethical hackers can be heroes: It’s time for the law to catch up

The UK government’s plan to finally rewrite the 1990 Computer Misuse Act to provide much-needed legal protections for ethical hackers is welcome, but now we need firm action. Read more »

Google Confirms Rising ‘Account Takeovers ’— Users Told to Check Chrome Settings

Google warns Chrome users of rising “account takeovers” and urges stronger authentication to keep accounts and synced data safe. The post Google Confirms Rising ‘Account Takeovers ’— Users Told... Read more »

NCSC warns of confusion over true nature of AI prompt injection

Malicious prompt injections to manipulate GenAI large language models are being wrongly compared to classical SQL injection attacks. In reality, prompt injection may be a far worse problem, says... Read more »

New Splunk Windows Flaw Enables Privilege Escalation Attacks

Splunk for Windows has a high-severity flaw that lets local users escalate privileges through misconfigured file permissions. Learn how to fix it. The post New Splunk Windows Flaw Enables... Read more »

Oracle EBS zero-day used by Clop to breach Barts Health NHS

Clop ransomware stole data from Barts Health NHS after exploiting a zero-day in its Oracle E-Business Suite. Barts Health NHS confirmed that Clop ransomware group stole data by exploiting... Read more »

NinjaOne rolls out secure, compliant remote access for IT teams

NinjaOne announced NinjaOne Remote, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in... Read more »

Veza brings unified visibility and control to AI agents across the enterprise

Veza has launched AI Agent Security, a purpose-built product to help organizations secure and govern AI agents at enterprise scale. As businesses accelerate AI adoption, Veza is defining a... Read more »

Download: Evaluating Password Monitoring Vendors

Organizations using Active Directory must update their password policies to block and detect compromised passwords. However, comparing vendors in this area can be challenging. By asking the right questions,... Read more »

AWS: China-linked threat actors weaponized React2Shell hours after disclosure

Multiple China-linked threat actors began exploiting the CVE-2025-55182, aka React2Shell flaw, within hours, AWS Security warns. Multiple China-linked threat actors began exploiting the CVE-2025-55182, also known as the React2Shell... Read more »

Apple and Google Alert Users Worldwide After New Spyware Activity Surfaces

Apple and Google confirmed last week that they have issued a new round of threat notifications to users around the world. The companies say these alerts are meant to... Read more »
Subscribe to our Newsletter