Prosecutors have been told they cannot rely on intercept evidence from the Sky ECC encrypted phone network in the absence of other evidence, unless they disclose the raw intercept data to defendants in decision that could have a significant impact on future prosecutions – Read more
Latest article
What the March 2026 Threat Technique Catalog update means for your AWS environment
The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security...
New BlobPhish Attack Leverages Browser Blob Objects to Steal Users’ Login Credentials
A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365...
Medtronic Confirms Data Breach After ShinyHunters Claims
Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda - Read more
Why AI agents are triggering a rethink of enterprise identity
The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, we look at the specific impacts of agentic...







