Firefox to let users manage and block AI features

Mozilla will add a set of controls in Firefox that let users manage and block GenAI features in the desktop browser. The controls will be included in Firefox version... Read more »

Snowflake makes enterprise data AI-ready with native Postgres in its AI Data Cloud

Snowflake announced advancements that make data AI-ready by design, enabling enterprises to rely on data that is continuously available, usable, and governed as AI transitions from experimentation into real-world... Read more »

Infosecurity Europe launches cyber security startups stream

Infosecurity Europe 2026 will feature a cyber security startup exhibition zone and a competition for business support, in conjunction with the UK Cyber Flywheel organisation Read more »

OpenAI releases Codex macOS app for agent-based software development

OpenAI has launched the new Codex app for macOS, a dedicated workspace for managing multiple AI coding agents in parallel. The app is designed to help developers reduce repetitive... Read more »

Notepad++ infrastructure hack likely tied to China-nexus APT Lotus Blossom

Rapid7 researchers say the Notepad++ hosting breach is likely linked to the China-nexus Lotus Blossom APT group. Recently, the Notepad++ maintainer revealed that nation-state hackers compromised the hosting provider’s... Read more »

Banks on the hook for £173m in APP fraud reimbursement

Banks paid 88% losses claimed by customers that fell victim to authorised push payment fraud last year Read more »

Why boards must prioritize non-human identity governance

Boards of Directors (BoDs) do three things exceptionally well when cyber is framed correctly. They set risk appetite, they allocate capital, and they demand evidence that the business can... Read more »

Open-source attacks move through normal development workflows

Software development relies on a steady flow of third-party code, automated updates, and fast release cycles. That environment has made the software supply chain a routine point of entry... Read more »

Why the UK needs to rethink the Investigatory Powers Act and allow intercept evidence in court

The UK needs clear and unambiguous laws around the use of digital evidence in court. The law has become tangled following rulings in the country’s EncroChat prosecutions. It’s time... Read more »

Product showcase: 2FAS Auth – Free, open-source 2FA for iOS

Online accounts usually rely on a password, but passwords alone can be weak if they’re reused, easily guessed, or stolen. Two-factor authentication (2FA) adds a second layer of verification,... Read more »
Subscribe to our Newsletter