Security
fast16 exposed: Cyber sabotage malware first teased in NSA leaks could be older than Stuxnet
"This forces a re‑evaluation of the timeline for serious nation-state covert cyber sabotage operations".
Security
" Intelligence and military agencies are displaying an eye-watering level of sophistication in their cyber operations."
Government
"Consumer applications were never designed to protect confidentiality or meet the demands of high-security environments."
Financial Systems
"Shocks can arrive with little warning and the vulnerabilities that preceded past crises have not disappeared, but re-emerged elsewhere."
AI
"Without appropriate rules and boundaries in place, agentic AI will be left to run riot, with speed and independence spiralling into risk."
AI
Westminster responds to a new Anthropic model that's been (over)hyped as an omen of imminent cybersecurity doom.
Critical Infrastructure
"Was this the first meeting that senior ministers have had with senior industry figures?"
Business
Why manufacturers are moving beyond spec races to tackle real-world problems like eye strain.
Enterprise
"The industry has spent five years building better autopsies. Now it needs to start building gates."
Quantum
Q-Day - the moment when quantum computers will be able to crack traditional cryptography - may not be a notional future threat forever.
Breaking changes in critical systems
Bots can hide secret information that's invisible to most humans within LLM-generated "synthetic multimedia content".
"Employees are not trying to be reckless, but unmanaged AI creates a direct path for sensitive data and information to leave the business."
World's first Agentic Credit Broking Protocol sets a standard for financial services bots as they take on mission-critical roles in lending.
High-risk figures warned to exercise extreme caution when using WhatsApp, Signal and other third-party applications.
"It’s tempting to dismiss these licenses as curiosities - but they highlight a fundamental tension and a lesson for technical leaders."
Research sheds new light on Google’s decision to accelerate its shift to post-quantum cryptography.
Financial crime is now a complex web spun by coordinated networks—and investigators face a difficult task untangling it.
Traditional encryption may soon be trivial to crack - prompting adversaries to gather sensitive protected data they can access in future.
Rapid7 uncovers "ongoing" espionage campaign involving long-term persistence within highly sensitive communications environments.
Adversaries are pushing beyond the perimeter to exploit the trusted infrastructure that keeps global businesses running.
"Talent displaced from large enterprises will intensify competition for roles at mid-sized and smaller organisations."
Blocking sales of foreign-made routers will fail to secure vast numbers of older devices described as threat actors’ “attack vector of choice”.