Microsoft DCU uses UK courts to hunt down cyber criminals

Microsoft has taken down the RedDVS cyber crime-as-a-service network after obtaining a UK court order, marking its first civil legal action outside of the US Read more »

UK government backtracks on plans for mandatory digital ID

The proposed national digital identity app will no longer be compulsory for conducting right-to-work checks, removing the most contentious and widely criticised element of the scheme Read more »

Microsoft patches 112 CVEs on first Patch Tuesday of 2026

January brings a larger-than-of-late Patch Tuesday update out of Redmond, but an uptick in disclosures is often expected at this time of year. Read more »

‘Dual-channel’ attacks are the new face of BEC in 2026

Business email compromise remains a significant threat as cyber fraudsters deploy a more diverse range of tactics against their potential victims, according to a report. Read more »

Cutting through the noise: SaaS accelerators vs. enterprise AI

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

How one IT chief shifted the needle on a reactive IT strategy

In spite of headlines that suggest every business should be ploughing vast sums of money into tech innovation, the reality remains that IT plays a supporting role for most... Read more »

Business leaders see AI risks and fraud outpacing ransomware, says WEF

C-suite executives are more concerned with risks arising from AI vulnerabilities and cyber fraud than ransomware, according to the World Economic Forum Read more »

Ofcom begins investigation of explicit image generation on Grok

Elon Musk’s Grok image generator, from parent company X, is being investigated by the UK regulator under the Online Safety Act Read more »

Intersec Dubai highlights why AI has become critical in the race against cyber attackers

Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale Read more »

Auditing, classifying and building a data sovereignty strategy

We look at data sovereignty – what it is and how to build a data sovereignty strategy around data auditing Read more »
Subscribe to our Newsletter