Microsoft Rolls Out Scalable Cybersecurity Playbook with SFI Patterns

Microsoft’s Secure Future Initiative (SFI) offers structured cybersecurity guidance to help organizations address complex challenges with proven security strategies. Read more »

Chrome sandbox escape nets security researcher $250,000 reward

Researcher earns Google Chrome ’s top $250K bounty for a sandbox escape vulnerability enabling remote code execution. A researcher who goes online with the moniker ‘Micky’ earned $250,000 from... Read more »

CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old security flaws impacting D-Link Wi-Fi cameras and video recorders to its Known Exploited Vulnerabilities (KEV) catalog,... Read more »

How ShinyHunters Hacking Group Stole Customer Data from Salesforce

Hackers posed as Salesforce IT staff, using vishing to trick employees into installing malicious software for data theft and extortion. Read more »

OpenAI’s GPT-5 Touts Medical Benchmarks and Mental Health Guidelines

OpenAI’s GPT-5 aims to curb AI hallucinations and deception, raising key questions about trust, safety, and transparency in large language model assistants. Read more »

What the Matter 1.4.2 update means for smart home security

Matter is built on the idea that smart home devices should be secure, reliable, and easy to use. It is based on Internet Protocol (IP), which allows devices, mobile... Read more »

Train Your Team in AI-Powered Pen Testing for Just $19.99

This $20 bundle offers lifetime access to AI and cybersecurity training for businesses, startups, and pros. Read more »

Manage Logins, Data Sharing, and Device Syncs from One Secure Vault

FastestPass takes the hassle out of managing logins, so you can stay focused on your work — not your passwords. Read more »

Win-DDoS: Attackers can turn public domain controllers into DDoS agents

SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also... Read more »

ShinyHunters Salesforce cyber attacks explained: What you need to know

Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Read more »
Subscribe to our Newsletter