Seemplicity unveiled a major product release packed with AI-powered capabilities to cut through noise, facilitate fixing teams, and reduce time to remediation. This latest release introduces AI Insights, Detailed... Read more »
BitRaser launched its Integrated Mac Eraser and Diagnostics Tool, a software designed to streamline IT asset disposition (ITAD) processes. The tool allows ITAD providers to simultaneously perform secure data... Read more »
Microsoft confirms two known China-nexus threat actors, and one other suspected state-backed hacking group, are exploiting vulnerabilities in SharePoint Server. Read more »
Many CNI organisations are perilously overconfident in their ability to manage and combat cyber risks, according to Bridewell research. This is leaving vital systems exposed. Read more »
Exploitation of the ToolShell RCE zero-day in Microsoft SharePoint continues to gather pace, with evidence emerging of exploitation by nation state-backed threat actors Read more »
Hackers exploit CrushFTP zero-day, tracked as CVE-2025-54309, to gain admin access via HTTPS when DMZ proxy is off. Threat actors are exploiting a zero-day vulnerability, tracked as CVE-2025-54309 (CVSS... Read more »
Critical infrastructure operators, hospitals, local councils and schools will be among those banned from giving in to cyber criminal demands as the UK moves forward with proposals to address... Read more »
We speak to OpenAI’s solution engineering lead, Matt Weaver, about enterprise adoption and making ChatGPT secure Read more »
Hardcoded credentials in HPE Aruba Instant On Wi-Fi devices, let attackers to bypass authentication and access the web interface. HPE disclosed hardcoded credentials in Aruba Instant On Wi-Fi devices... Read more »
We speak to Moderne CEO and OpenRewrite inventor, Jonathan Schneider, about application modernisation Read more »