Exclusive: Manifest’s Marc Frankel on AI Supply Chain Security In today’s rapidly evolving digital landscape, the integration of artificial intelligence (AI) technologies into business operations has become increasingly prevalent. While…
Data Breaches
DOGE transfers social security data to the cloud, sources say
DOGE Transfers Social Security Data to the Cloud: What This Means for Federal Security and Data Management Practices In a recent turn of events, a report has surfaced indicating that…
Azure Active Directory flaw exposes sensitive credentials
Mitigating Security Risks: Addressing the Azure Active Directory Flaw In the realm of digital landscapes, where data reigns supreme, security vulnerabilities are akin to unlocked doors inviting potential threats. Recently,…
SYTECH Launches Year-Long Continual Cyber Assurance Programme for Business Security In today’s digital age, the threat of cyber attacks looms large over businesses of all sizes. The increasing sophistication of…
Espionage Fears Rise as TAG-144 Evolves Techniques In the ever-evolving landscape of digital security, the emergence of sophisticated techniques by threat actor groups has raised espionage fears to new heights.…
Attackers bypass email security by abusing Microsoft Teams defaults
Attackers Bypass Email Security by Abusing Microsoft Teams Defaults In today’s constantly evolving digital landscape, cyber threats continue to pose a significant risk to businesses of all sizes. One such…
Data Bust: Breaches Grew In The First Half Of The Year
Data Bust: Breaches Grew In The First Half Of The Year Data breaches have become a prevalent concern in today’s digital age, with cyber attacks being the primary instigator behind…
What the UK’s updated cyber security and resilience bill means for SMEs in 2025
The Impact of the UK’s Cyber Security and Resilience Bill on SMEs in 2025 As the digital landscape continues to evolve, so do the threats that businesses face in terms…
Brave uncovers vulnerability in Perplexity’s Comet that risked sensitive user data
Uncovering Perplexity’s Comet Vulnerability: A Potential Threat to Sensitive User Data In the realm of digital security, vigilance is paramount. Recently, researchers have unearthed a concerning vulnerability in Perplexity’s Comet…
Copilot policy flaw allows unauthorized access to AI agents
Copilot Policy Flaw Exposes Microsoft AI Agents to Unauthorized Access A recent discovery has brought to light a critical flaw in Microsoft’s Copilot agent access policy, potentially leaving AI agents…