In cyber security, basics matter, even in 2025

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Read more »

ServiceNow Mulls $7B Armis Cybersecurity Acquisition

The deal could be announced within days, according to Bloomberg. The post ServiceNow Mulls $7B Armis Cybersecurity Acquisition appeared first on TechRepublic. Read more »

Kali Linux 2025.4: New tools and “quality-of-life” improvements

OffSec has released Kali Linux 2025.4, a new version of its widely used penetration testing and digital forensics platform. Most of the changes are related to appearance and usability:... Read more »

What is driving the rise of infostealer malware?

Infostealer malware is a growing problem for cyber security teams, and these attacks have the potential to cause significant damage to businesses. What is enabling them to thrive? Read more »

How researchers are teaching AI agents to ask for permission the right way

People are starting to hand more decisions to AI agents, from booking trips to sorting digital files. The idea sounds simple. Tell the agent what you want, then let... Read more »

Prometheus: Open-source metrics and monitoring systems and services

Prometheus is an open-source monitoring and alerting system built for environments where services change often and failures can spread fast. For security teams and DevOps engineers, it has become... Read more »

Europe’s DMA raises new security worries for mobile ecosystems

Mobile security has long depended on tight control over how apps and services interact with a device. A new paper from the Center for Cybersecurity Policy and Law warns... Read more »

What types of compliance should your password manager support?

Lost credentials and weak authentication controls still sit at the center of many security incidents. IT leaders and CISOs know this problem well. They also know that regulators watch... Read more »

Manufacturing is becoming a test bed for ransomware shifts

Manufacturing leaders may feel that ransomware risk has settled, but new data shows the threat is shifting in ways that require attention, according to a Sophos report. A global... Read more »

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalog, following reports... Read more »
Subscribe to our Newsletter