Insights

Insecure use of Signal app part of wider Department of Defense problem, suggests Senate report

In short, while there was no evidence that unsanctioned app use is routine or normalized, it is likely that enough staff are using them to...

M365 customers should explore alternatives, plan to dicker as prices hikes loom — analysts

There are now more than 430 million commercial M365 users globally, Microsoft said during an earnings call earlier this year.  Jack Gold, analyst at J....

OpenAI prompts AI models to ‘confess’ when they cheat

OpenAI trained a version of GPT-5 Thinking to produce the confessions and tested the technique on stress-test datasets designed to elicit problematic behaviors including hallucinations,...

ShadyPanda Takes its Time to Weaponize Legitimate Extensions 

ShadyPanda has been playing the long game. Over the last seven years, the group has been uploading malicious extensions on the downlow, gaining user trust...

CrowdStrike Extends Scope of AWS Cybersecurity Alliance

CrowdStrike this week extended its alliance with Amazon Web Services (AWS) to automate configuration of its Falcon security information event management (SIEM) platform in addition...

US federal software reform bill aims to strengthen software management controls

CIOs could be punished Yvette Schmitter, a former Price Waterhouse Coopers principal who is now CEO of IT consulting firm Fusion Collective, was especially pessimistic...

Trending News

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Business Security Identity is effectively the new network boundary. It must be protected at all costs. Phil Muncaster 04 Dec 2025  •  , 4 min....

MuddyWater: Snakes by the riverbank

ESET researchers have identified new MuddyWater activity primarily targeting organizations in Israel, with one confirmed target in Egypt. MuddyWater, also referred to as Mango Sandstorm...

Oversharing is not caring: What’s at stake if your employees post too much online

Social Media From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company...

This month in security with Tony Anscombe – November 2025 edition

Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news 28 Nov...

What parents should know to protect their children from doxxing

Kids Online Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake. Phil Muncaster 27 Nov 2025...

Influencers in the crosshairs: How cybercriminals are targeting content creators

Social Media Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters. Phil...