The roles and challenges in moving to quantum-safe cryptography

A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study draws on a structured workshop with public sector, private... Read more »

Product showcase: Blokada for Android gives users control over network traffic

Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections... Read more »

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses... Read more »

Passwords are still breaking compliance programs

The security stack has grown, but audits still stumble on passwords. CISOs see this every year. An organization may have strong endpoint tools, layered network defenses, and a documented... Read more »

What security teams miss in email attacks

Email remains the most common entry point for attackers. This article examines how phishing, impersonation, and account takeover continue to drive email breaches and expose growing security gaps across... Read more »

Fujitsu Post Office IT support team were ‘legalised hackers’

Backdoors meant it was possible for Fujitsu staff to steal money from Post Office branches, says former Fujitsu tech worker Read more »

Former Fujitsu IT support team were ‘legalised hackers’

Backdoors meant it was possible for Fujitsu staff to steal money from Post Office branches, says former Fujitsu tech worker Read more »

Russia-linked APT UAC-0184 uses Viber to spy on Ukrainian military in 2025

Russia-linked APT UAC-0184 targets Ukrainian military and government bodies via Viber, delivering malicious ZIP files for espionage in 2025. Russia-linked threat actor UAC-0184 (aka Hive0156) is targeting Ukrainian military... Read more »

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a “security incident” that led to the loss of... Read more »

Trusted Google Notifications Used in Phishing Campaign Targeting 3,000+ Orgs

Researchers warn that attackers are abusing Google notifications and cloud services to deliver phishing emails that bypass traditional email security controls. The post Trusted Google Notifications Used in Phishing... Read more »
Subscribe to our Newsletter