IT for manufacturing
Manufacturing is an increasingly IT-intensive industry, as FMCG and consumer goods makers try to understand what consumers want and use information and technology to underpin their business strategies. Analysis of how manufacturers and construction firms use IT to operate cost-effectively and at maximum efficiency holds lessons for IT managers in any sector.
-
News
14 Nov 2025
Jaguar Land Rover cyber attack costs firm £485m in the quarter
Jaguar Land Rover’s quarterly financial statement discloses a £485m loss due to the late August cyber attack that halted production for six weeks, damaging the UK economy Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
12 Nov 2025
Microsoft users warned over privilege elevation flaw
An elevation of privilege vulnerability in Windows Kernel tops the list of issues to address in the latest monthly Patch Tuesday update Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Nov 2025
IT services companies and datacentres face regulation as cyber security bill reaches Parliament
The Cyber Security and Resilience Bill will require large IT services companies, including datacentres, to report security incidents within 24 hours Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
07 Nov 2025
Resilience for resilience: Managing burnout among cyber leaders
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- John Skipper and Farrukh Ahmad, PA Consulting
-
Opinion
06 Nov 2025
We need to build psychological readiness into cyber security
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Haris Pylarinos, Hack The Box
-
Opinion
05 Nov 2025
CISO burnout: A crisis of expectation and isolation
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
05 Nov 2025
Government to broaden ‘narrow’ computing curriculum
Planned changes to the computer science curriculum announced following independent review recommendations Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Nov 2025
The Security Interviews: Colin Mahony, CEO, Recorded Future
Recorded Future’s CEO talks threat intelligence, AI in cyber security and the ever-changing cyber threat landscape Continue Reading
By -
Opinion
04 Nov 2025
We can alleviate the expanding burden on the CISO
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Sam Thornton, Bridewell
-
Opinion
03 Nov 2025
CISOs in court: Balancing cyber resilience and legal accountability
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Aditya K Sood, Aryaka
-
Opinion
03 Nov 2025
Just weeks left until Companies House ID changes: how to prepare
Just over two weeks remain before Companies House starts enforcing new digital identity verification procedures for company directors, but there's still time to get ready. Continue Reading
By- Tim Barnett, Credas Technologies
-
News
31 Oct 2025
Cyber agencies co-sign Exchange Server security guide
US and allied cyber agencies team up to try to nudge users to pay more attention to securing Microsoft Exchange Server Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
31 Oct 2025
Ransomware resilience: It’s time to be ‘more Bruce Lee’
The growing threat of ransomware attacks requires cyber to evolve from a defensive posture to being increasingly proactive. Building threat intel can enable this, helping better predict, prioritise and prevent ransomware attacks. Continue Reading
By- Jason Steer, CISO, Recorded Future
-
Opinion
31 Oct 2025
Why asset visibility matters in industrial cyber security
Industrial organisations face rising operational security cyber threats. Asset visibility is vital for defence - without knowing what’s connected, organisations are risk blind Continue Reading
By- Magpie Graham
-
News
31 Oct 2025
Capgemini and Siemens combine to make AI industrial tech
Siemens and Capgemini are expanding their partnership to create AI-based industrial technologies, said to boost efficiency, sustainability and innovation in manufacturing sectors Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
29 Oct 2025
Scope of US state-level privacy laws expands rapidly in 2025
Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
28 Oct 2025
Pulling the plug: A way to halt a cyber attacker in your network?
Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality Continue Reading
By -
News
27 Oct 2025
LockBit 5.0 expands targeting amid ransomware escalation
The LockBit RaaS operation is back in action, with technical features and expanded targeting, and is contributing to a steadily growing number of ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Oct 2025
UK ramps up ransomware fightback with supply chain security guide
Multinational guidance, developed by the UK and Singapore, is designed to help organisations reinforce their supply chain against ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Oct 2025
The US government shutdown is a wake-up call for cyber self-reliance
As the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading
By- John Paul Cunningham, Silverfort Inc
-
News
22 Oct 2025
Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitors
The UK's Cyber Monitoring Centre calculates the overall cost of the Jaguar Land Rover cyber attack will be almost two billion pounds Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Oct 2025
The Netherlands faces €12bn R&D investment gap as productivity stagnates
Dutch government unveils nine-point plan to meet European 3% GDP target after its competitiveness ranking plummeted Continue Reading
By- Kim Loohuis
-
News
15 Oct 2025
India’s biggest IT firm to create 5,000 UK jobs
Indian IT giant will increase its UK-based workforce by thousands over the next three years Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Oct 2025
AI will create a better world, says Oracle’s Ellison
Oracle ramped up its plans to lead in all things AI on the opening day of its renamed customer event, AI World, with founder Larry Ellison emphasising AI’s transformative potential Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Oct 2025
Beyond the refresh: Your cyber strategy must include AI PCs
Viewing a PC refresh as part of security strategy helps build a more resilient and productive enterprise and is an opportunity to move beyond tactical upgrades to adopt a security-first hardware strategy for the AI era. Continue Reading
By- Louise Quennell, Dell Technologies
-
News
09 Oct 2025
Warlock ransomware may be linked to Chinese state
The operators of Warlock ransomware who exploited a set of SharePoint Server vulnerabilities earlier this year likely have some kind of link to the Chinese government, researchers claim Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2025
Qilin gang claims cyber attack on Japanese brewing giant
The Qilin ransomware gang has claimed responsibility for a cyber attack that has halted brewing at Asahi Group Holdings, causing Japanese retailers to run low on beer Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2025
Interview: Fausto Fleites, vice-president of data intelligence, ScottsMiracle-Gro
The data leader’s hands-on experience with machine learning has helped to build a three-part strategy to maximise the benefits of AI at the gardening specialist Continue Reading
By -
Opinion
07 Oct 2025
Why it takes 11 hours to resolve one ID-related cyber incident
A recent ESG study revealed it takes an average of 11 hours for enterprises to resolve a single identity-related security incident. How did we get here, and what do we need to do differently? Continue Reading
By- Ev Kontsevoy, Teleport
-
News
07 Oct 2025
Alert over Medusa ransomware attacks targeting Fortra MFT
Microsoft warns it is seeing potential mass exploitation of a Fortra GoAnywhere vulnerability by a threat actor linked to the Medusa ransomware-as-a-service operation. Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Oct 2025
The Security Interviews: David Bradbury, CSO, Okta
Okta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Building resilience in the cloud: Bridging SLA gaps and mitigating risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Vaibhav Dutta, Tata Communications
-
News
03 Oct 2025
Interview: Sacha Vaughan, chief supply chain officer, Joseph Joseph
As the houseware maker’s supply chain is being transformed for the digital age, its leader explains why technology knowledge is critical to her job Continue Reading
By -
News
01 Oct 2025
US government shutdown stalls cyber intel sharing
A key US law covering cyber security intelligence sharing has expired without an extension or replacement amid a total shutdown of the federal government, putting global security collaboration at risk. Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
MPs press outsourcer TCS over Jaguar cyber attack
The government’s cross-bench Business and Trade Committee has written to Tata Consultancy Services seeking answers over possible links to cyber attacks on Jaguar Land Rover, Marks and Spencer, and Co-op Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Apple’s first iOS 26 security update fixes memory corruption flaw
Apple issues an update for its brand new iOS 26 mobile operating system, fixing a potentially dangerous vulnerability affecting iPhones, iPads and other Mac devices Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
UK and US urge Cisco users to ditch end-of-life security appliances
An ongoing campaign of cyber attacks is targeting users of end-of-life Cisco security appliance kit Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
JLR tentatively restarts production, following £1.5bn government backing
Jaguar Land Rover is to resume car production after a £1.5bn government loan guarantee amid its cyber attack fallout. Debate is growing over the bailout and insurance Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
29 Sep 2025
Why SLA gaps should not hinder cloud innovation
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ashley Barker and Irfan Ahmed, PA Consulting
-
News
26 Sep 2025
Over half of India-based companies suffer security breaches
Business supply chains, which include Indian companies, are at risk of attack as more than half of suppliers were breached last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Sep 2025
Okta CEO: AI security and identity security are one and the same
At Oktane 2025 in Las Vegas, Okta CEO Todd McKinnon describes AI security and identity security as inseparable as he tees up a series of agentic security innovations Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2025
Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact
The government is considering buying car parts from JLR’s supply chain to sell them on to the company once it recovers from the August cyber attack Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
25 Sep 2025
Netherlands establishes cyber resilience network to strengthen public-private digital defence
Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading
By- Kim Loohuis
-
News
24 Sep 2025
Oktane 2025: Okta takes aim at agentic AI governance gap
Identity specialist Okta is laying the groundwork for a number of incoming announcements designed to help its customers get to grips with the challenge of securing non-human, agentic identities. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Sep 2025
Rethinking identity in the age of AI impersonation
Trust in business has long hinged on human instincts but with the advent of deepfakes, it is becoming dangerous to assume too much. Continue Reading
By- Akif Khan, Gartner
-
News
23 Sep 2025
Jaguar Land Rover extends cyber attack-induced shutdown to October
Jaguar Land Rover is extending its production shutdown caused by the 31 August cyber attack into next month, as government ministers drop by and supply chain workers lose wages Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
19 Sep 2025
Government meets with car parts suppliers amid JLR cyber crisis
Government officials have met with the Society of Motor Manufacturers and Traders to discuss the challenges they are facing amid disrupted production at Jaguar Land Rover Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2025
UK cyber action plan lays out path to resilience
A report produced for the government by academics at Imperial College London and the University of Bristol sets out nine recommendations to strengthen the UK’s cyber sector Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
18 Sep 2025
Are AI agents a blessing or a curse for cyber security?
Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Continue Reading
By -
News
17 Sep 2025
Microsoft scores win against Office 365 credential thieves
Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2025
NCC: How RaaS team-ups help Scattered Spider enhance its attacks
Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Sep 2025
Jaguar Land Rover extends production shutdown for another week
Jaguar Land Rover says that vehicle production will remain suspended in the wake of a cyber attack, while the hackers allegedly responsible claim they are retiring from a life of crime Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Sep 2025
Cyber leaders must make better use of risk experts
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ellie Hurst, Advent IM
- Mike Gillespie
-
News
16 Sep 2025
Turkish state tightens grip on comms
Turkish subscriptions to fixed broadband were the lowest in Europe in 2024 and half as common as those in more developed countries Continue Reading
By- Mark Ballard
-
News
10 Sep 2025
Splunk.conf: Cisco and Splunk expand agentic SOC vision
The arrival of agentic AI in the security operations centre heralds an era of simplification for security professionals, Splunk claims Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2025
Jaguar Land Rover admits data has been compromised in cyber attack
The car maker revealed that data was stolen in the cyber attack that began on 31 August, as its production line continues to be affected Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Feature
10 Sep 2025
Quantum startups fear EU too slow to lead
Europe’s bid to win the race to build viable quantum computers wants details, money and confidence of the industry it is intended to serve Continue Reading
By- Mark Ballard
-
News
09 Sep 2025
Splunk.conf: Splunk urges users to eat their ‘cyber veggies’
The dawn of AI-enabled cyber attacks makes it even more important for defenders to bring their A-game, particularly when it comes to getting the basics right Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Sep 2025
Lessons from Jaguar Land Rover: How can businesses prepare for cyber attacks?
A cyber attack at Jaguar Land Rover has halted production lines and caused widespread disruption. How can businesses protect themselves and mitigate the risks of such an attack? Continue Reading
By- Dominic Holden
-
News
05 Sep 2025
US politicians ponder Wimwig cyber intel sharing law
US cyber data sharing legislation is set to replace an Obama-era law, but time is running out to get it over the line, with global ramifications for the security industry, and intelligence and law enforcement communities Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2025
Jaguar Land Rover cyber attack keeps workers at home
The recent cyber attack on Jaguar Land Rover is keeping workers out of the plants as possible attack group identity becomes public Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
05 Sep 2025
SLA promises, security realities: Navigating the shared responsibility gap
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Aditya K Sood, Aryaka
-
Opinion
03 Sep 2025
Bridging the SLA gap: A guide to managing cloud provider risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- John Bruce, Quorum Cyber
-
News
02 Sep 2025
Cyber attackers damage Jaguar Land Rover production
Jaguar Land Rover reports a cyber attack has ‘severely disrupted’ its vehicle production and retail operations, recalling similar attacks on other prominent British brands this year Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
28 Aug 2025
UK cyber security centre helps expose China-based cyber campaign
GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Aug 2025
Incident response planning cuts the risk of claiming on cyber security insurance
Proper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Aug 2025
Ransomware activity levelled off in July, says NCC
Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Aug 2025
Three new Citrix NetScaler zero-days under active exploitation
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Aug 2025
Okta makes AI identity play with Axiom acquisition
Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Aug 2025
Ransomware attack volumes up nearly three times on 2024
During the first six months of 2025, the number of observed and tracked ransomware attacks far outpaced the volume seen in 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Moscow exploiting seven-year-old Cisco flaw, says FBI
US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Apple iOS update fixes new iPhone zero-day flaw
Latest Apple zero-day found in the ImageIO framework opens the door for targeted zero-click attacks on iPhone users Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2025
Microsoft starts including PQC algorithms in cyber foundations
Microsoft updates on its post-quantum cyber strategy as it continues integrating quantum-safe algorithms into some of the core foundations underpinning its products and services Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2025
Commvault users told to patch two RCE exploit chains
Storage firm Commvault fixes four vulnerabilities that, when combined, create a pair of RCE exploit chains that could be used to target on-premise customers with ransomware and other nasties Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
Google spins up agentic SOC to speed up incident management
Google Cloud elaborates on its vision for securing artificial intelligence unveiling new protections and capabilities across its product suite Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
Interview: Differentiating with AI in pet care
We speak to Mars Pet Nutrition’s head of digital innovation about making artificial intelligence relevant across its brands to support pet health Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Aug 2025
Workday hit in wave of social engineering attacks
A campaign of voice-based social engineering attacks targeting users of Salesforce’s services appears to have struck HR platform Workday Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Aug 2025
Would you hire a hacker?
At a time when cyber security breaches are on the up and skills remain in short supply, security experts believe we may be missing a trick by overlooking unconventional sources of talent Continue Reading
By -
News
15 Aug 2025
UK cyber leaders feel impact of Trump cutbacks
The ripple effects of US cyber security cutbacks have reached this side of the Atlantic, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Aug 2025
Teen hackers aren't the problem. They're the wake-up call
If we take the time to build the right pathways into cyber, young people could be our best line of defence. Continue Reading
By- Fergus Hay, The Hacking Games
-
Podcast
13 Aug 2025
AI in pet health: A Computer Weekly Downtime Upload podcast
We speak to Mars Pet Nutrition’s head of digital innovation, Kate Balingit, about using computer vision with smartphone photos to assess pet health Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Aug 2025
Eight critical RCE flaws make Microsoft’s latest Patch Tuesday list
Microsoft rolls out fixes for over 100 CVEs in its August Patch Tuesday update Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
Researchers firm up ShinyHunters, Scattered Spider link
ReliaQuest researchers present new evidence that firms up a potential link, or outright partnership, between the ShinyHunters and Scattered Spider cyber gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
UK work visa sponsors are target of phishing campaign
Mimecast identifies a phishing campaign targeting UK organisations that sponsor migrant workers and students, opening the door to account compromise and visa fraud Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Aug 2025
What boards should look for in a CISO
The role of the chief information security officer has evolved dramatically over the years – and will continue to do so. What should boards really looking for when hiring a security leader in 2025? Continue Reading
By- Rinki Sethi, Upwind Security
-
Feature
11 Aug 2025
ShinyHunters Salesforce cyber attacks explained: What you need to know
Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Aug 2025
How CISOs can adapt cyber strategies for the age of AI
Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders need to rethink. Continue Reading
By- Martin Riley, Bridewell Consulting
-
News
06 Aug 2025
Black Hat USA: Startup breaks secrets management tools
Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Cyber criminals would prefer businesses don’t use Okta
Okta details a phishing campaign in which the threat actor demonstrated some unusually strong opinions on what authentication methods they would like their targets to use Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Aug 2025
Attacker could defeat Dell firmware flaws with a vegetable
Cisco Talos discloses five vulnerabilities in cyber security firmware used on Dell Latitude and Precision devices, including one that could enable an attacker to log on with a spring onion Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Aug 2025
Black Hat USA: Halcyon and Sophos tag-team ransomware fightback
Ransomware experts Halcyon and Sophos are to pool their expertise in ransomware, working together to enhance data- and intelligence-sharing and bringing more comprehensive protection to customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jul 2025
Scattered Spider tactics continue to evolve, warn cyber cops
CISA, the FBI, NCSC and others have clubbed together to update previous guidance on Scattered Spider's playbook, warning of new social engineering tactics and exploitation of legitimate tools, among other things Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jul 2025
MS Authenticator users face passkey crunch time
The deadline for moving to passkeys in Microsoft Authenticator is rapidly approaching, and users are advised to take action now Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jul 2025
AI-enabled security pushes down breach costs for UK organisations
Organisations that are incorporating AI and automation into their cyber security practice are seeing improved outcomes when incidents occur, according to an IBM study Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jul 2025
Global cyber spend will top $200bn this year, says Gartner
Worldwide spending on cyber security will hit another record high in 2025, and will go higher still next year Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jul 2025
European digital market figurehead pleads to Westminster
Big EU industry joins with Europhile MP to persuade obstinate government officials to join the dataspaces intended to become the bedrock of Europe’s digital single market Continue Reading
By- Mark Ballard
-
News
24 Jul 2025
SharePoint users hit by Warlock ransomware, says Microsoft
Microsoft’s security analysts confirm a number of cyber attacks on on-premise SharePoint Server users involve ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2025
Scattered Spider victim Clorox sues helpdesk provider
Cleaning products manufacturer Clorox fell victim to a Scattered Spider social engineering attack two years ago – it blames its IT helpdesk provider, Cognizant Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2025
Dutch researchers use heartbeat detection to unmask deepfakes
Dutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading
By- Kim Loohuis
-
News
22 Jul 2025
Microsoft confirms China link to SharePoint hacks
Microsoft confirms two known China-nexus threat actors, and one other suspected state-backed hacking group, are exploiting vulnerabilities in SharePoint Server Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jul 2025
Chinese cyber spies among those linked to SharePoint attacks
Exploitation of the ToolShell RCE zero-day in Microsoft SharePoint continues to gather pace, with evidence emerging of exploitation by nation state-backed threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jul 2025
Patch ToolShell SharePoint zero-day immediately, says Microsoft
The active exploitation of a dangerous zero-day vulnerability chain in Microsoft SharePoint – which was disclosed over the weekend – is underway. Immediate action is advised Continue Reading
By- Alex Scroxton, Security Editor
