The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, explore the changing nature of the identity stack and learn what will change as identity evolves into a real-time control plane for agentic systems. – Read more
Latest article
TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules
A highly sophisticated Brazilian banking trojan named TCLBANKER, tracked under the campaign REF3076, this malware represents a major update to the older Maverick and...
ShinyHunters Extorts Universities in New Instructure Canvas Hack
ShinyHunters-linked attackers defaced Canvas portals, disrupting finals week access and exposing SaaS security risks for schools.
The post ShinyHunters Extorts Universities in New Instructure Canvas...
Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile
The five new vulnerabilities discovered in Ivanti’s on-premises mobile endpoint management solution are a “classic example of the legacy trap”...





