Main Story

Editor’s Picks

Trending Story

Insights

USENIX Security ’25 (Enigma Track) – Please (Don’t) Stop The Music: Adversarial Red-Teaming Of AI Music Generation Models

Author, Creator & Presenter: Jannis Kirschner, Niantic Inc. Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and...

ClickFix attackers using new tactic to evade detection, says Microsoft

“And all Windows computers should already be restricted so that random, unsigned (not signed by the organization), PowerShell commands should not be allowed. Every organization and...

5 Actions Critical for Cybersecurity Leadership During International Conflicts

  The recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into...

Randall Munroe’s XKCD ‘Binary Star’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...

European consumers ask EU to put a stop to digital enshittification

Online rights campaigners have come together to complain about the propensity of IT companies to make life more difficult for their users. The groups, mainly...

Leaked Mac benchmarks show that Apple offers tomorrow’s AI PCs today

In this day and age, it means how well your systems run artificial intelligence. We know that every single one of these Macs will run...

Trending News

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...

PromptSpy ushers in the era of Android threats using GenAI

ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine learning has been used to...