Latest Cybersecurity News
View all →VoidStealer Malware Targets Chrome Data Despite Built-In Browser Protections
A newly discovered infostealer called VoidStealer is raising concerns after researchers revealed it can bypass Google Chrome’s App-Bound Encryption (ABE), a security feature designed to protect sensitive…
Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts
The highly anticipated Pwn2Own Berlin 2026 hacking competition concluded on 16 May 2026, following three days of intense activity at the OffensiveCon conference, and we…
New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain
A SHub macOS infostealer variant called Reaper impersonates Apple, Microsoft, and Google to trick users into executing malicious code, then targets browser data, password managers,…
The New Phishing Click: How OAuth Consent Bypasses MFA
In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340 Microsoft 365 organizations across five…
Hot, or not? Why are there so few datacentre waste heat projects in the UK?
Datacentres in Nordic countries are connected to multiple district heating networks. The UK’s neighbouring countries, Ireland and France, also have projects. But the UK hasn’t…
Event Cinemas owner EVT to make network software-defined
Entertainment and travel group EVT has started moving to software-defined networking in a bid to boost its data capacity and reduce its reliance on physical…
Verizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach Vector
Vulnerability exploitation was the most common access vector for data breaches in 2025, the latest installment of Verizon’s annual Data Breach Investigations Report (DBIR) shows.…
Microsoft dismantled Malware-signing network Fox Tempest
Microsoft dismantled malware-signing network Fox Tempest Pierluigi Paganini May 19, 2026 Microsoft disrupted Fox Tempest, a malware-signing-as-a-service (MSaaS) that allowed attackers to sign malware with…
CISA credential leak raises alarms, and Capitol Hill demands answers
Congressional Democrats want answers from the Cybersecurity and Infrastructure Security Agency about the reported public exposure of sensitive agency credential data on GitHub in an…