‘Lipstick is my armour’ – Law Gazette – Features
Jo Delahunty KC and Dana Denis-Smith, chroniclers of the experience of women in the legal profession, talk to Eduardo Reyes about remaining obstacles to true gender equality. – Read More
Jo Delahunty KC and Dana Denis-Smith, chroniclers of the experience of women in the legal profession, talk to Eduardo Reyes about remaining obstacles to true gender equality. – Read More
The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists. – Read More
Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and…
Aderant today (30 March) announced the successful completion of its SOC 2 Type 2 examination for its outside counsel guideline solution Onyx. The examination, performed by independent CPA firm Schellman…
What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come…
Security researchers are warning that applications using AI frameworks without proper safeguards can expose sensitive information in basic, yet critical, non-AI ways. According to a recent Cyera analysis, widely used…
The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager. – Read More
The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager. – Read More
Understanding the threats and staying ahead of the adversary – Read More
Anthropic didn’t intend to introduce Mythos this way. Details of what it calls its most capable AI model yet surfaced through a data leak in its content management system (CMS),…
Secrets sprawl isn’t slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian’s State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and…
Recent breaches suggest attackers are shifting beyond traditional endpoints to target application programming interfaces (APIs). But typical perimeter protections can completely miss this vector. “We used to talk about defense-in-depth…
Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that’s distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to…
The percentage of road-traffic accident claims with psychological injury indicated in medical reports are increasing YoY across both the MoJ and OIC portals. The post Verisk Claims data bites: Personal…
In my years securing cloud-native environments, I’ve noticed a recurring blind spot. We obsess over the “front doors” such as exposed dashboards, misconfigured RBAC, or unpatched container vulnerabilities. We harden…