Our phones as our castles: can His Majesty’s Government enter?

Ancient laws secure the sanctity of even the most humble of homes from government intrusion. How do they fare in an age of digital technology? Read more »

The Security Interviews: David Bradbury, CSO, Okta

Okta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model Read more »

Building resilience in the cloud: Bridging SLA gaps and mitigating risk

The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not... Read more »

CrowdStrike ties Oracle EBS RCE (CVE-2025-61882) to Cl0p attacks began Aug 9, 2025

CrowdStrike links Oracle EBS flaw CVE-2025-61882 (CVSS 9.8) to Cl0p, enabling unauthenticated RCE, first exploited on August 9, 2025. CrowdStrike researchers attributed with moderate confidence the exploitation of Oracle... Read more »

U.S. CISA adds Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Oracle, Mozilla, Linux Kernel, Microsoft Windows, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security... Read more »

How to get better results from bug bounty programs without wasting money

The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that would otherwise slip through. A new academic study based... Read more »

The architecture of lies: Bot farms are running the disinformation war

Bot farms have moved into the center of information warfare, using automated accounts to manipulate public opinion, influence elections, and weaken trust in institutions. Algorithms reward noise over truth... Read more »

Cybersecurity’s next test: AI, quantum, and geopolitics

Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and... Read more »

Cybersecurity jobs available right now: October 7, 2025

Application Security / DevSecOps Engineer AvetixCyber | USA | Remote – View job details As an Application Security / DevSecOps Engineer, you will integrate security tools and processes into... Read more »

Discord discloses third-party breach affecting customer support data

Discord reported a data breach at a third-party customer service provider that exposed user data, including contact details, IPs, and billing info. Discord disclosed a breach at a third-party... Read more »
Subscribe to our Newsletter