IT security
-
News
13 Mar 2026
Interpol obliterates cyber criminal infrastructure
A major Interpol operation has resulted in the seizure of thousands of malicious cyber criminal IP addresses and servers, and multiple arrests. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Mar 2026
How CISOs can build a truly unified and resilient security platform
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
-
News
13 Mar 2026
UK falls behind on supercomputing amid slow investment, NAO warns
While UKRI has improved its oversight of research and innovation, funding remains fragmented and has been too slow to replace supercomputers Continue Reading
By -
Feature
12 Mar 2026
Vulnerability reports: Increase in quantity, decrease in quality?
Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find and report bugs and giving businesses a route to fix unknown flaws. However, this model is now facing scrutiny. What is driving these concerns? Continue Reading
By -
News
12 Mar 2026
The UK government’s digital identity scheme: Dystopian nightmare or modernised public services?
Critics and supporters of digital ID are honing their arguments for the government’s consultation – but it’s the public that will decide. How should you choose? Continue Reading
By- Bryan Glick, Editor in chief
-
News
11 Mar 2026
Iran war a melting pot for other cyber threats
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2026
Cyber industry welcomes women, but challenges persist
Three-quarters of women working in security say they feel comfortable in the field, but women are still much more likely to be laid off and face persistent challenges around career advancement, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2026
Salesforce tracks possible ShinyHunters campaign targeting its users
Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Mar 2026
Confidence in AI-powered cyber must be earned, not assumed
In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just whether an AI-powered tool works but how it actually behaves when it is stressed, manipulated, or forced to operate outside already known conditions. Continue Reading
By- Haris Pylarinos, Hack The Box
-
Opinion
11 Mar 2026
Strong security balances consolidation and best-of-breed capabilities
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Martin Riley, Bridewell Consulting
-
News
11 Mar 2026
Child rapist could have profiled victims through unaudited access to NHS databases
NHS analyst’s conviction for child sexual abuse offences raises concerns over unaudited access to patient data Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
11 Mar 2026
CISOs on alert: Strengthening cyber resilience amid geopolitical tensions in the Middle East
As regional uncertainty rises, security leaders across the Gulf focus on resilience, faster incident response and deeper threat intelligence to protect critical systems and data Continue Reading
By- Andrea Benito , Computer Weekly
-
News
11 Mar 2026
Welsh government boosts funding for cyber education
The Welsh government’s Tech Valleys programme is providing three-quarters of a million pounds to help reach thousands of primary school children with security education and careers guidance Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Mar 2026
Microsoft patches zero-days in .NET and SQL Server
Zero-days in .NET and SQL Server, and a handful of critical RCE bugs, form the nucleus of Microsoft’s March Patch Tuesday update Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Mar 2026
Whitehall launches digital ID consultation
Eight-week consultation aims to get the public’s view on how the proposed digital ID system would work, and contemplates introducing a universal unique identifier linked to the ID Continue Reading
By -
News
10 Mar 2026
Met Police to ‘trial’ handheld facial recognition tech
London Mayor Sadiq Khan reveals in a scrutiny session with London Assembly members that the Met is set to trial a facial recognition phone app for police officers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Mar 2026
AI chooses nuclear escalation in 95% of simulated crises
With artificial intelligence increasingly deployed in analysis and decision-making in armed conflict, research shows AI systems will not naturally default to ‘safe’ outcomes in nuclear crises Continue Reading
-
Opinion
10 Mar 2026
Why Asia needs its own model of digital sovereignty
Framing digital sovereignty simply as a “US versus non-US cloud” debate is no longer fit for purpose. Asia must forge its own path through data jurisdiction, technical portability, and operational control Continue Reading
By- Terry Maiolo
-
News
10 Mar 2026
WA auditor general flags weak Microsoft 365 security controls across state entities
Western Australia’s Office of the Auditor General has uncovered weaknesses in M365 configurations across seven government agencies, leading to compromised accounts and data breaches Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
09 Mar 2026
UK to launch cyber fraud squad in April
The UK’s Online Crime Centre, launching next month, will bring together government, police, intelligence agencies, banks, mobile networks and tech firms to take coordinated action against cyber fraud Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Mar 2026
Trump looks to power up post-quantum, AI security
The US has unveiled a six-pillar national cyber security strategy, with developing technological areas such as post-quantum cryptography and artificial intelligence front and centre Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Mar 2026
APT36 unleashes AI-generated ‘vibeware’ to flood targets
The Pakistani threat group has been using AI to rewrite malicious code across multiple programming languages, prioritising scale over sophistication to evade detection, security researchers have found Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
06 Mar 2026
Scattered Spider attack on TfL affected 10 million people
The 2024 Scattered Spider attack on Transport for London affected approximately 10 million people, many of whom remain blissfully unaware their data was compromised Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Mar 2026
Platformisation without illusion: Separating integration from theatre
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Aditya K Sood, Aryaka
-
Feature
06 Mar 2026
CIO risk management: Lessons from Southern Glazer's CIO
Steve Bronson, CIO of Southern Glazer's Wine & Spirits, explains how his team tackles AI, talent, operational and vendor risks to keep the business resilient. Continue Reading
By- Tim Murphy, Site editor
-
News
06 Mar 2026
Norway braced for foreign AI cyber attacks on vital petroleum computing
Nordic petrostate is preparing for war and turning the spotlight on vulnerabilities in its critical industries, as adversaries look for ways to damage the most important oil and gas producer to the EU Continue Reading
By -
News
06 Mar 2026
Nordics ally with Baltics to accelerate digital wallet roll-out
Baltic and Nordic countries work together on a common certification system to support digital wallet applications Continue Reading
By- Gerard O'Dwyer
-
News
06 Mar 2026
Enterprises warming to AI PCs amid growing cloud costs
While global memory shortages will pose a threat to the broader PC market, AI PCs are gaining momentum across Asia as companies look to cut cloud costs, boost productivity and secure sensitive information Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
05 Mar 2026
Electronic health records are still creating issues for patients
Almost every NHS trust will have moved onto a digital system by this spring. Experts have cautioned many patients are still struggling to access their own health data Continue Reading
By -
News
05 Mar 2026
Spyware suppliers exploit more zero-days than nation states
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2026
Government wants to build digital ID system in-house
The Home Affairs Committee hearing on digital ID reveals consultation is due next week; there will be no central database; and while government wants to build the system in-house, it will not replace private digital ID providers Continue Reading
By -
Feature
05 Mar 2026
Edge AI: Business cost, risk and control
Right now, rather than asking whether or not to adopt edge artificial intelligence, the crucial question for most companies is how to do so without creating new security, cost and governance issues Continue Reading
-
News
05 Mar 2026
Police do not have to explain to lawyer Fahad Ansari why they seized his phone data, says court
A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
04 Mar 2026
Iranian hacktivists muster their forces but state APTs lay low
Hacktivist activity surrounding the Iran war is sky-high but Iran’s state-backed cyber espionage actors have yet to show their hands, giving security teams a valuable window of time to shore up their defences Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2026
Zero-day in Android phone chips under active attack
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been exploited in the wild as a zero-day Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2026
Tycoon2FA phishing platform dismantled in major operation
A Europol-led sting against the infamous Tycoon2FA MFA bypass phishing service has been successful, with operations disrupted and ringleaders and cyber criminal users identified Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2026
Landmark legal challenge against Home Office eVisa system heard
The UK High Court will examine whether the Home Office policy of refusing to issue alternative proof of immigration status outside of its electronic visa system is lawful Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
03 Mar 2026
Open cyber standards key to cross-platform integration
The Security Think Tank looks at platformisation considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Stephen McDermid, Okta
-
News
03 Mar 2026
Resilience under pressure: How regional conflict is reshaping the Middle East tech strategy
From AWS outages in the UAE to stronger focus on data control and cyber security, tech leaders say the Israel-US-Iran conflict is challenging, but not stopping the region’s digital goals Continue Reading
By- Andrea Benito , Computer Weekly
-
News
03 Mar 2026
NCSC: No increase in cyber threat from Iran, but be prepared
While cyber threat levels remain stable following the outbreak of war in the Middle East at the weekend, at-risk organisations in the UK should take steps to ward off potential reprisals from Iran-linked threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
02 Mar 2026
Governments urged to step up enforcement of big tech amid rush to ban social media for under-16s
The Council of Europe’s Commissioner for Human Rights says that European governments should consider better enforcement against big tech companies before banning children from social media. Continue Reading
-
Feature
02 Mar 2026
Weighing up the enterprise risks of neocloud providers
Anything that expands quickly can attract bubble accusations, and the market for cloud services in an AI age doesn’t look to be different Continue Reading
By -
News
26 Feb 2026
Qilin crew continues to dominate ransomware ecosystem
The Qilin ransomware gang remained ‘top dog’ in January 2026, with over 100 observed cyber attacks to its name, amid a rapidly evolving and fragmenting cyber criminal ecosystem Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2026
Fake UK government website redirect detection time reduced to eight days
It used to take two months, but the UK government has reduced the time it takes to address fake DNS redirects Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Feb 2026
US artificial intelligence developers accuse Chinese firms of stealing their data
Artificial intelligence developers are accusing Chinese firms of stealing their intellectual property following a spate of ‘distillation attacks’, despite their own alleged theft of training data Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Feb 2026
CrowdStrike touts agentic SOC to tackle security woes
By embedding AI agents across its platform, CrowdStrike is looking to help security teams automate repetitive security tasks, enabling them to focus on complex and stealthier threats that could slip under the radar Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
25 Feb 2026
Cisco Catalyst SD-WAN users targeted in series of cyber attacks
The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called UAT-8616 Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2026
The UK’s proposed social media ban explained
The UK government will use new legal powers to lay the groundwork for an under-16 social media ban after its consultation on children’s digital well-being, but opponents warn the measures being considered will only treat the symptoms of the problem if they ignore the structural power of big tech Continue Reading
-
News
25 Feb 2026
Application exploitation back in vogue, says IBM cyber unit
IBM’s X-Force unit observes an uptick in the exploitation of vulnerable public-facing software applications Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2026
Police created ‘intelligence profile’ of BBC journalist subject to phone surveillance
Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
25 Feb 2026
How AI code generation is pushing DevSecOps to machine speed
Organisations should adopt shared platforms and automated governance to keep pace with the growing use of generative AI tools that are helping developers produce code at unprecedented volumes Continue Reading
-
News
24 Feb 2026
Cyber association launches code of conduct for security pros
ISC2’s Code of Professional Conduct will supposedly establish a worldwide framework dedicated to principled and ethical practices in the security trade Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
24 Feb 2026
Retirement plans postponed as tech issues delay pension payments
In this week’s Computer Weekly ezine, we dig into the tech issues affecting the Civil Service Pension Scheme, which have left some members in severe financial difficulties. We also sit down with Segro CIO Richard Corbridge to find out how he is bringing to bear his experience of working in both the private and public sector to make digital transformation happen at the property management company. The buyer’s guide this week starts a series of articles about neocloud providers, and how the rising demand for artificial intelligence and sovereign capabilities are reshaping the cloud computing market. And, rounding out the issue, we have a feature looking at the work that is going into creating a viable quantum internet. Read the issue now. Continue Reading
-
News
23 Feb 2026
Innovate UK cyber startup programme gets £10m funding booster
Graduates of DSIT and Innovate UK's CyberASAP scheme to commercialise cutting-edge cyber research projects have raised nearly £50m in the past decade Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2026
Governments urged to step up enforcement of big tech amid rush to ban social media for under-16s
The Council of Europe’s Commissioner for Human Rights says that European governments should consider better enforcement against big tech companies before banning children from social media Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
23 Feb 2026
Why crypto agility is key to quantum readiness
With quantum computing threatening current encryption standards, experts call for organisations to achieve crypto agility by managing the lifecycle of certificates and cryptographic keys through automation Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
20 Feb 2026
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan.. Continue Reading
By -
News
20 Feb 2026
UK AI alignment project gets OpenAI and Microsoft boost
Altogether, £27m is now available to fund the AI Security Institute’s work to collaborate on safe, secure artificial intelligence Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Feb 2026
What it takes to secure agentic commerce
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on and detecting anomalous behaviour will be key to safeguarding automated transactions, according to Akamai Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
19 Feb 2026
ICO wins appeal over data protection obligations in Currys cyber attack
The UK Information Commissioner’s Office has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics retailer Currys PC World Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2026
PromptSpy Android malware may exploit Gemini AI
A newly uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain persistence Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2026
European politicians amplify disinformation about UN rapporteur
Government officials from the US and Europe have condemned UN special rapporteur Francesca Albanese for remarks about Israel she never made, based on a truncated clip circulating online that takes her statements out of context Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Feb 2026
Bank of Ireland UK fined for late security system implementation
The payments regulator has fined the bank nearly £4m after it missed a deadline to implement a system to check payees Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
19 Feb 2026
AI? Remember Automation…
With the endless AI buzz dominating every technology headline and press release, it’s easy to forget the origins of “computer intelligence”; namely the likes of expert systems, macros and the “A” ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
19 Feb 2026
The year that speed changed cyber security
At a time when threat actors are operating at machine speed, understanding which essential systems are needed to keep the lights on can be the difference between business continuity and existential crisis Continue Reading
By- Niraj Naidu
-
News
18 Feb 2026
Flaws in Google and Microsoft products added to Cisa catalogue
Cisa has added six CVEs to its Kev catalogue this week, including newly disclosed issues in Google Chromium and Dell RecoverPoint for Virtual Machines, and some older flaws as well Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2026
0APT ransomware crew makes embarrassing splash
A ransomware gang called 0APT has attracted attention, but many of its victims may not even be real, and its operators are being accused of over-egging their criminal pudding Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Feb 2026
Generative and agentic AI in security: What CISOs need to know
AI is introducing new risks that existing evaluation and governance approaches were never designed to manage, creating a widening gap between what AI-backed security tools promise and what can be realistically controlled. Continue Reading
By- Avivah Litan, Gartner
-
News
18 Feb 2026
HP bets on edge AI and regional investment to power Middle East enterprise transformation
Ertug Ayik, managing director for Middle East and Africa at HP Inc, outlines how on-device artificial intelligence, embedded security and a partner-first model are positioning the company at the heart of MENA’s digital transformation Continue Reading
By- Andrea Benito , Computer Weekly
-
News
17 Feb 2026
Western cyber alliances risk fragmenting in new world order
The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks appear increasingly precarious Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Feb 2026
Businesses may be caught by government proposals to restrict VPN use
Labour proposals to restrict social media use to people aged 16 and under could have unintended consequences for businesses using virtual private networks Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
17 Feb 2026
The evolution of threat research: Looking beyond best-of-breed
Traditional models of threat research as a service are changing and evolving towards a more bespoke model that puts more control in the hands of end-user cyber teams Continue Reading
-
Feature
17 Feb 2026
The ethical challenges of America’s social media vetting policy
The US government is incorporating social media vetting as part of its border control policy, leading to concerns about what data will be collected and how it will be protected Continue Reading
-
News
17 Feb 2026
Artificial intelligence ‘creeping into’ high-risk stock trading
Growing reliance on artificial intelligence is encroaching into the stock market, finds research Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Feb 2026
Government wages cyber campaign as half the UK’s SMEs are breached
UK government says half of all small businesses have been cyber breached in the recent past as it urges them to ‘lock the door’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
17 Feb 2026
British Transport Police start using live facial recognition
British Transport Police will deploy facial recognition for six months despite calls for the government to halt its rapid expansion of the technology Continue Reading
-
News
17 Feb 2026
Italian Navy sets sail with Ericsson 5G
Project sees long-range 5G Standalone data communication at sea successfully demonstrated, with on-board connectivity and naval vessel systems tested in real day and night operations Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
17 Feb 2026
Charities turn to tech for greater impact
The fallout from the Post Office scandal is a recurring theme of reporting for Computer Weekly, and in this week’s ezine, we find out how the organisation’s efforts to address the shortcomings of its Horizon software have resulted in it being hit with a multimillion-pound IR35-related tax bill. We also sit down with Checkout.com CTO Mariano Albera to find out how he’s applying his knowledge of e-commerce to the finance sector, and why coding will always have a special place in his heart. In the third and final instalment of the AI security buyer’s guide, we take a look at how the technology can both help and hinder enterprise IT security strategies. And, rounding out the issue, we find out how five different charities are using CRM and digital experience technologies to bolster donations. Read the issue now. Continue Reading
-
Feature
16 Feb 2026
Making sense of AI’s role in cyber security
Cyber security companies have jumped on the AI bandwagon. We look at where artificial intelligence is a useful add-on and where it poses potential risks Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Feb 2026
Europe’s data protection supervisors warn over plans to ‘narrow’ privacy rights
European data protection supervisors warn the European Commission against narrowing the privacy protections for personal data as it gears up for a swathe of data protection reforms Continue Reading
By- Bill Goodwin, Investigations Editor
-
Tip
12 Feb 2026
How to build an incident response framework
Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include. Continue Reading
By -
News
12 Feb 2026
European Commission: TikTok’s addictive design breaches EU law
In a preliminary ruling, European Commission says TikTok’s additive design features are in breach of laws designed to create safer digital spaces Continue Reading
-
News
11 Feb 2026
CVE volumes may plausibly reach 100,000 this year
The number of vulnerabilities to be disclosed in 2026 is almost certain to exceed last year's total, and may be heading towards 100,000, according to analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2026
London Assembly member: Police should halt facial-recognition technology use
In lieu of a full-blown ban on the technology, Green London Assembly member Zoë Garbett has called for a number of new safeguards to be implemented that she feels would protect Londoners from ‘escalating’ biometric surveillance Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Feb 2026
The Security Interviews: Mick Baccio, Splunk
Mick Baccio, global security advisor at Splunk SURGe and Cisco Foundation AI, reveals how the experience of running cyber on a dime for a US presidential campaign has informed how he does security, and why the basics still matter Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2026
CIOs discuss friction between legacy IT and innovation
While it may not be something IT leaders want to talk about, managing technical debt is critical to moving forward with IT innovation Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
11 Feb 2026
AI enters its ‘grassroots backlash’ era
As artificial intelligence permeates aspects of the economy and society, individuals and civic groups are devising creative ways to rebel - but any impact on AI’s development, adoption and regulation is unclear Continue Reading
By- Kyle Hiebert, Computer Weekly
- Alexander Martin
-
Opinion
11 Feb 2026
The world’s default productivity tool is becoming a national security liability
The rapid exploitation of a bug in Office by Russian cyber attackers shows that the current system of patching - for a software application that is practically ubiquitous in enterprise IT - has become a security risk for everyone Continue Reading
By- Bill McCluggage
-
News
10 Feb 2026
Arctic Wolf targets mid-market security gap in APAC
Following the launch of its full portfolio in Malaysia, the SOC provider discusses the security challenges facing lean IT teams, the value of supplier neutrality, and its roadmap for AI and ransomware protection Continue Reading
-
News
10 Feb 2026
February Patch Tuesday: Microsoft drops six zero-days
Microsoft releases patches for six zero-day flaws in its latest monthly update, many of them related to security feature bypass issues Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Feb 2026
Researchers delve inside new SolarWinds RCE attack chain
Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Feb 2026
How agentic AI could destroy social media: the need for proactive governance
If organisations using agentic and generative AI don’t codify ethics and oversight now, the future may be filled with AI agents using generative AI to communicate with other agents, destroying trust in social media Continue Reading
By- Raihan Islam, defineXTEND
-
News
10 Feb 2026
Second ever international AI safety report published
More than 100 artificial intelligence experts have produced the second international AI safety report ahead of a summit in India, outlining a high degree of uncertainty about the development and risks of AI Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Feb 2026
Artificial intelligence now finance sector’s ‘connective tissue’
Major study finds debate over AI adoption is over as almost every finance firm in the world is already using the technology Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
10 Feb 2026
Security Think Tank: Stop buying AI, start buying outcomes
Rik Ferguson, vice-president of security intelligence at Forescout, considers what CISOs and buyers need to know to cut through the noise around artificial intelligence and assess the various AI cyber use cases Continue Reading
-
E-Zine
10 Feb 2026
Zooming in on police technology plans
This week’s edition of the Computer Weekly ezine takes a closer look at the technology changes the Home Office is seeking to introduce to the UK policing sector as part of its wide-ranging reform programme. We also hear from the global CIO of PC hardware manufacturer Lenovo about the work he is doing to grow the company’s services business. Rounding out the issue, we have two features digging deep-er into the security side of artificial intelligence, with one looking at how suppliers are adding the technology to their security portfolios and the other guiding buyers on what to look for when selecting AI security products. Read the issue now. Continue Reading
-
Opinion
10 Feb 2026
How GenAI is breaking traditional cyber security awareness tactics
With threat actors exploiting the growing use of generative AI tools and the prevalence of shadow AI, organisations must strengthen their security programmes and culture to manage the rising risk Continue Reading
By- Richard Addiscott
-
News
10 Feb 2026
Singapore mounts largest ever cyber operation to oust APT actor
Operation Cyber Guardian mobilised over 100 defenders to neutralise UNC3886, which infiltrated Singtel, StarHub, M1 and Simba networks, operators issue joint pledge on defence-in-depth Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
09 Feb 2026
Russia’s cyber attacks on Polish utilities draws NCSC alert
A series of Russian cyber attacks targeting Poland’s energy infrastructure has prompted a warning from the UK’s National Cyber Security Centre Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Feb 2026
UAE’s TII challenges big tech dominance with open source Falcon AI models
Through its Falcon models and an open, efficiency-driven research strategy, the Technology Innovation Institute is positioning the UAE as a producer of foundational AI, not merely a consumer of global platforms Continue Reading
By- Andrea Benito , Computer Weekly
-
News
09 Feb 2026
US bid for Dutch ID infrastructure raises sovereignty concerns
Kyndryl’s proposed takeover shows how critical systems become exposed to foreign control without an overarching policy decision Continue Reading
By- Kim Loohuis
-
News
09 Feb 2026
As space gets crowded, cyber threats from jamming to stalker satellites loom large
Experts at the inaugural CYSAT Asia in Singapore warn of the urgency of securing space assets amid growing geopolitical tensions and supply chain vulnerabilities Continue Reading
By- Aaron Tan, Informa TechTarget
