Harvard University confirmed being targeted in the Oracle EBS campaign after the Cl0p ransomware group leaked 1.3 TB of data. Harvard University confirmed it was targeted in the Oracle... Read more »
Regula has launched its Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a single, unified workflow. Built to scale... Read more »
Picus Security launched new AI-powered breach and attack simulation (BAS) capabilities within the Picus Security Validation Platform. This introduces a new level of speed and intelligence, enabling security teams... Read more »
NetApp unveiled new products, strengthening its enterprise-grade data platform for AI innovation. The new NetApp AFX decouples performance and capacity with a disaggregated NetApp ONTAP that runs on the... Read more »
The UK’s NCSC handled 429 cyberattacks from Sept 2024–Aug 2025, including 204 nationally significant cases, over double the previous year’s total. The UK’s National Cyber Security Centre (NCSC) reported... Read more »
Visa unveiled the Trusted Agent Protocol, establishing a foundational framework for agentic commerce that enables secure communication between AI agents and merchants during every step of a transaction. The... Read more »
The government’s proposals for a national digital identity scheme have been widely criticised, but is the prime minister smart enough to realise that an alternative plan could bring wider... Read more »
SpyChain shows how unverified COTS hardware in small satellites can enable persistent, multi-component supply chain attacks using NASA’s NOS3 simulator. The rise of small satellites has transformed scientific, commercial,... Read more »
Oracle issued an emergency security update to address a new E-Business Suite (EBS) vulnerability tracked as CVE-2025-61884. Oracle released an emergency patch to address an information disclosure flaw, tracked as... Read more »
A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how data is distributed, even when that information is incomplete.... Read more »