




Cisa has added six CVEs to its Kev catalogue this week, including newly disclosed issues in Google Chromium and Dell RecoverPoint for Virtual Machines, and some older flaws as well Continue Reading

AI is introducing new risks that existing evaluation and governance approaches were never designed to manage, creating a widening gap between what AI-backed security tools promise and what can be realistically controlled. Continue Reading

UK government says half of all small businesses have been cyber breached in the recent past as it urges them to ‘lock the door’ Continue Reading

The fallout from the Post Office scandal is a recurring theme of reporting for Computer Weekly, and in this week’s ezine, we find out how the organisation’s efforts to address the shortcomings of its Horizon software have resulted in it being hit with a multimillion-pound IR35-related tax bill. We also sit down with Checkout.com CTO Mariano Albera to find out how he’s applying his knowledge of e-commerce to the finance sector, and why coding will always have a special place in his heart. In the third and final instalment of the AI security buyer’s guide, we take a look at how the technology can both help and hinder enterprise IT security strategies. And, rounding out the issue, we find out how five different charities are using CRM and digital experience technologies to bolster donations. Read the issue now. Continue Reading

The number of vulnerabilities to be disclosed in 2026 is almost certain to exceed last year's total, and may be heading towards 100,000, according to analysis Continue Reading

Following the launch of its full portfolio in Malaysia, the SOC provider discusses the security challenges facing lean IT teams, the value of supplier neutrality, and its roadmap for AI and ransomware protection Continue Reading

Microsoft releases patches for six zero-day flaws in its latest monthly update, many of them related to security feature bypass issues Continue Reading

Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability Continue Reading

Exploitation of CVE-2025-40551, an RCE flaw affecting SolarWinds Web Help Desk, appears to be spreading, with defenders on high alert Continue Reading

While AI presents a significant opportunity to further the way we do business, what if it’s time to consider a new direction? What if the safest and most effective path for AI isn’t to go larger, but smaller instead? Continue Reading

Infosecurity Europe 2026 will feature a cyber security startup exhibition zone and a competition for business support, in conjunction with the UK Cyber Flywheel organisation Continue Reading

As it underwent a growth spurt in the early 2020s, graphic design platform Canva turned to 1Password to manage identity across its expanding organisation Continue Reading

Amid a wave of market consolidation, Computer Weekly speaks to Keeper Security’s leadership on how identity and access management systems are becoming unified identity platforms capable of securing both human and machine identities Continue Reading

Forrester examines the key factors security leaders and IT decision-makers need to evaluate when considering AI-enabled IT security Continue Reading
Professional cyber association ISC2 pledges support to UK government’s Software Security Ambassador scheme, part of the recently unveiled Cyber Action Plan Continue Reading

A US judge has dismissed a lawsuit filed by CrowdStrike shareholders over the July 2024 outage that caused widespread disruption around the world Continue Reading

Industrial cyber security firm Nozomi Networks has opened its Singapore headquarters, doubling its regional headcount, and pledging to remain vendor agnostic while targeting the manufacturing and utility sectors Continue Reading

January brings a larger-than-of-late Patch Tuesday update out of Redmond, but an uptick in disclosures is often expected at this time of year Continue Reading

C-suite executives are more concerned with risks arising from AI vulnerabilities and cyber fraud than ransomware, according to the World Economic Forum Continue Reading

Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale Continue Reading

Partnerships with Finland’s Unikie and Solita will bring UAE-developed secure autonomy technologies to critical infrastructure, public safety and AI-enabled operations across Northern Europe Continue Reading

Security leaders discuss the rise of agentic AI, warning that autonomous agents operating at machine speed will require organisations to move away from static protection towards behavioural monitoring and automated reasoning Continue Reading

Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 Continue Reading

AI dominated all tech conversations this year, but the concerns of cyber security professionals extend far beyond. From remote work to supply chains, quantum to identity, there were plenty of other topics for the industry to chew over in 2025. Continue Reading

As artificial intelligence moves from experimentation to production and cyber threats escalate, the Middle East is entering a decisive phase of digital transformation, says Omdia chief analyst Trevor Clarke Continue Reading

Claims that Quantum Computing will destroy Bitcoin may be exaggerated, but Bitcoin will need to adapt. Continue Reading

Inaugural AI Security Institute report claims that safeguards in place to ensure AI models behave as intended seem to be improving Continue Reading

The company is to offer bug bounty awards for people who report security vulnerabilities in third-party and open source software impacting Microsoft services Continue Reading

AI agents can transform security operations and ease workloads, but security teams need to look past the hype to find tools that truly augment human analysts and deliver measurable outcomes Continue Reading

The final Patch Tuesday update of the year brings 56 new CVEs, bringing the year-end total to more than 1,100 Continue Reading

Computer Weekly speaks to Katie Moussouris, security entrepreneur and bug bounty pioneer, about the life of security researchers, bug bounties and the artificial intelligence revolution Continue Reading

Malicious prompt injections to manipulate GenAI large language models are being wrongly compared to classical SQL injection attacks. In reality, prompt injection may be a far worse problem, says the UK’s NCSC Continue Reading

Exploitation of an RCE flaw in a widely used open source library is spreading quickly, with China-backed threat actors in the driving seat Continue Reading

The Information Commissioner’s Office considered fining the Post Office £1m for a 2024 data breach that let subpostmasters down again Continue Reading

As AI reshapes the regional cyber security landscape, diversity and skills development remain at the heart of building a resilient digital workforce Continue Reading

At AWS re:Invent 2025, the cloud giant unveiled a security agent designed to bridge the gap between development speed and security validation, along with the general availability of Security Hub analytics Continue Reading

Nine months after restructuring its go-to-market, Okta is buoyed by a growing recognition of how crucial identity has become thanks to the spread of AI agents Continue Reading

Four London councils – Kensington and Chelsea; Hackney; Westminster; and Hammersmith and Fulham – have suffered cyber attacks, disrupting services and prompting NCSC-supported investigation Continue Reading

Cyber breach at US financial sector tech provider highlights the risk of third-party vulnerabilities in finance ecosystems Continue Reading

In this week’s edition of Computer Weekly, we take a closer look at the knotty tale of MI5’s numerous attempts to identify a BBC journalist’s sources by obtaining phone data, and whether this led to further surveillance of its targets. Elsewhere in the issue, the City of Pittsburgh’s chief data officer talks about the work he is doing to deliver better public services to citizens with the help of data. This week’s Buyer’s Guide features the third and final instalment in our series advising enterprises on how to get started on using agentic artificial intelligence (AI) – with a look at the concept of creating AI factories to scale deployments. Rounding out the issue is our look at why the cyber security market is facing something of a recruitment crisis, and how this is forcing organisations to approach hiring talent in new ways. Read the issue now. Continue Reading

An elevation of privilege vulnerability in Windows Kernel tops the list of issues to address in the latest monthly Patch Tuesday update Continue Reading

As data threats grow, Cohesity helps enterprises and government institutions in the UAE and wider Middle East secure, manage, and derive value from their data Continue Reading

While hackers are using artificial intelligence to optimise attacks, many of the most damaging breaches still rely on old-school methods, says a top security analyst from Google Continue Reading

Cisco researchers probed some of the most widely used public GenAI LLMs and found many of them were dangerously susceptible to so-called multi-turn cyber attacks producing undesirable outputs Continue Reading

IT and networking giant builds on enterprise network architecture with systems designed to simplify operations across campus and branch deployments such as network configuration Continue Reading

Attackers are using automated tools to target development environments within seconds of them going live, warns Darktrace’s global field chief information security officer Continue Reading

Bugcrowd acquires scaleup Mayhem Security to enhance the ingenuity of its human hackers with AI-backed software testing capabilities Continue Reading

Europe faces rising cyber threats from criminals and nation-states, according to CrowdStrike. Ransomware attacks now take just 24 hours, with 22% of global victims being European Continue Reading

US and allied cyber agencies team up to try to nudge users to pay more attention to securing Microsoft Exchange Server Continue Reading

Zscaler’s deal with the Philippine bank comes as it is expanding its platform’s capabilities and footprint across Asia Continue Reading

As the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading

AI agents require standardised guidelines, clear human responsibility and a shared language between developers and policymakers to be secure and trusted, experts say Continue Reading

Nato has chosen Oracle and Druid to secure private 5G networks for cyber defence, war gaming and research, using Oracle Cloud and edge technology Continue Reading

In this week’s edition of Computer Weekly, we take a look at the government’s somewhat controversial plan to introduce a national, compulsory digital ID scheme. Ranil Boteju, chief data and analytics officer at Lloyds Banking Group, also runs us through how the financial services giant is planning to use agentic AI to improve the customer experience. In the third part of our buyer’s guide on cloud management and security, details about the plethora of security tools that exist for enterprises looking to manage their Amazon Web Services stacks gets the deep-dive treatment. And, in our final feature in the issue, we look at the evolution in mobile app technology within the retail space. Read the issue now. Continue Reading

Oracle pushes a patch for a dangerous zero-day under active exploitation by one of the most notorious ransomware gangs around Continue Reading

Apple issues an update for its brand new iOS 26 mobile operating system, fixing a potentially dangerous vulnerability affecting iPhones, iPads and other Mac devices Continue Reading

Business supply chains, which include Indian companies, are at risk of attack as more than half of suppliers were breached last year Continue Reading

Singapore’s national broadcaster has achieved a 99.5% crash-free rate for its mobile apps by using observability tools to find and fix issues in real time, ensuring a smoother experience for users Continue Reading

Co-op reveals £206m costs from April cyber attack, with revenues hit, member data stolen and shelves emptied, exposing major retail supply chain vulnerabilities Continue Reading

Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading

A newly uncovered RCE flaw in SolarWinds’ helpdesk product bypasses two previously issued fixes, and users should prioritise updates as exploitation is likely to occur Continue Reading

The penetration testing specialist is expanding its presence in the Asia-Pacific region and deploying AI-driven capabilities as it eyes acquisitions and a potential IPO Continue Reading

Google’s Agent Payments Protocol is an open standard developed with more than 60 global partners to create a secure standard for AI-driven transactions Continue Reading

The car maker revealed that data was stolen in the cyber attack that began on 31 August, as its production line continues to be affected Continue Reading

The dawn of AI-enabled cyber attacks makes it even more important for defenders to bring their A-game, particularly when it comes to getting the basics right Continue Reading

AI is increasingly at the heart of organisations’ digital transformation journeys – whether that’s to drive up efficiencies, generate powerful insights from data, delight customers, or supercharge internal productivity. Continue Reading

Understanding prevention and recovery steps is crucial for managing attacks on Active Directory Continue Reading

Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading

US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading

Storage firm Commvault fixes four vulnerabilities that, when combined, create a pair of RCE exploit chains that could be used to target on-premise customers with ransomware and other nasties Continue Reading

Okta research indicates the emergence and growth of novel security problems, connected with the spread of AI agents and non-human identities Continue Reading

Microsoft rolls out fixes for over 100 CVEs in its August Patch Tuesday update Continue Reading

Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading

The DRY (don't repeat yourself) principle, introduced by Andrew Hunt and David Thomas in 'The Pragmatic Programmer,' promotes the idea that every piece of knowledge should have a single, unambiguous, authoritative representation within a system. Continue Reading

Research finds increased adoption of unsanctioned generative artificial intelligence platforms is magnifying risk and causing a headache for security teams Continue Reading

Apple pushes what will likely be the last major security update to its current iPhone and iPad operating systems, fixing 29 vulnerabilities in its mobile ecosystem Continue Reading

Organisations that are incorporating AI and automation into their cyber security practice are seeing improved outcomes when incidents occur, according to an IBM study Continue Reading

Cambridge Consultants is a technology and consulting business unit of Capgemini. Its chief executive, Monty Barlow, talks about its heritage and vision for the future of digital technology Continue Reading

The OWASP Top 10 serves as a key reference point for developers and security professionals, but with a new iteration on the horizon, we need to confront a hard truth: has it lost its effectiveness, or have we failed to implement it meaningfully? Continue Reading

We speak to the inventor of OpenRewrite about how enterprise IT can manage code across thousands of source code repros Continue Reading

Many CNI organisations are perilously overconfident in their ability to manage and combat cyber risks, according to Bridewell research. This is leaving vital systems exposed. Continue Reading

We speak to Moderne CEO and OpenRewrite inventor, Jonathan Schneider, about application modernisation Continue Reading

The active exploitation of a dangerous zero-day vulnerability chain in Microsoft SharePoint – which was disclosed over the weekend – is underway. Immediate action is advised Continue Reading

A year has passed since the CrowdStrike outage caused widespread disruption to enterprise IT systems and infrastructure, but what - if anything - has been learned from the situation? Continue Reading

With cyber criminals using automated tools to steal data in minutes, organisations must focus on runtime protection and automated responses to combat the rising threat from AI and misconfigured cloud assets Continue Reading

Organisations are struggling to prioritise vulnerability patching appropriately, leading to situations where everything is a crisis, which helps nobody, according to a report Continue Reading

The NCSC is expanding its vulnerability research project to draw in external expertise Continue Reading

Businesses and consumers alike may not feel the need to upgrade to Windows 11 as its predecessor approaches end-of-life, but they are putting their own security at risk, says the NCSC Continue Reading

Everyone involved in IT needs to be focused on the implications of artificial intelligence (AI) on enterprise cybersecurity. Yet precious little energy is being expended on making sure AI is ... Continue Reading

Microsoft patched well over 100 new common vulnerabilities and exposures on the second Tuesday of the month, but its latest update is mercifully light on zero-days Continue Reading

With cyber attacks spiking in non-English-speaking markets such as Japan, the security firm is boosting its regional presence to combat a wave of AI-generated threats Continue Reading

Singapore’s defence cyber chief warns that the traditional lines between military conflict and civilian life are blurring, with adversaries now targeting civilian systems and using AI to put the threat landscape on steroids Continue Reading

An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Continue Reading

Dutch research reveals how cognitive biases can lead to catastrophic security decisions Continue Reading

Oxford City Council election workers had personal information stolen by cyber attackers in an attack over the weekend of 7-8 June. The council has stated that most disrupted systems are back online Continue Reading

Barely 70 vulnerabilities make the cut for Microsoft’s monthly security update, but an RCE flaw in WEBDAV and an EoP issue in Windows SMB Client still warrant close attention Continue Reading

An APPG report warns that the government’s flagship cyber security legislation is too narrow in its scope and risks missing opportunities to embed resilience at the heart of the British economy Continue Reading

To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the language of business, according to a senior Check Point executive Continue Reading

GitLab CISO Josh Lemos explains how the company is weaving AI, through its Duo tool, into the entire software development lifecycle to enhance efficiency and automate incident response Continue Reading

Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack Continue Reading

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading

The Netherlands is facing a growing cyber security crisis, with a staggering 66% of Dutch businesses lacking adequate cyber resilience, according to academic research. Continue Reading
In The Current Issue:Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
The real risk of AI isn't experimentation—it's deployment. Leaders must address governance, data gaps and oversight before ...
Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand ...
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that ...
Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be ...
Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, ...
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
Follow this step-by-step guide on decommissioning a data center, covering planning, inventory management, data security, and ...
Smart data centers reduce costs and enhance grid stability, enabling operators to evolve from passive consumers to active ...
Due to rapid AI hardware advancement, companies release advanced products yearly to keep up with the competition. The new ...
Establish a multi-phased approach that turns a risky situation into a managed process with several departments working in ...
New Agentic Data Plane features enable users to create a governance layer for agents and could help the vendor differentiate ...
AI's competitive advantage is shifting from model scale to data quality. Organizations that invest in governance and ...