Please turn on your JavaScript for this page to function normally.
passkeys
Users advised to drop passwords and make room for passkeys

In a decisive move that could reshape how users log in online, the National Cyber Security Centre (NCSC) is urging consumers to abandon passwords in favour of passkeys, …

Agentic AI
Indirect prompt injection is taking hold in the wild

The open web is slowly but surely filling up with “traps” designed for LLM-powered AI agents. The technique, known as indirect prompt injection (IPI), involves …

hand
Compromised everyday devices power Chinese cyber espionage operations

China-linked threat actors have shifted from individually procured infrastructure to large-scale covert networks, botnets built from compromised routers and other edge …

backdoor
New Cisco firewall malware can only be killed by pulling the plug

Suspected state-sponsored attackers are using a custom backdoor to persistently compromise Cisco security devices (firewalls), the US CISA and the UK National Cyber Security …

Meta
Meta is overhauling how you sign in, manage settings, and protect your accounts

Meta Account gives users of Meta apps and devices a simpler way to access and manage their accounts. Accounts Center will automatically be updated to a Meta Account as part of …

Ubuntu 26.04 LTS Resolute Raccoon
Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers

Linux distributions have spent the past few years absorbing GPU vendor toolchains, Rust-based system components, and more stringent encryption defaults. Ubuntu 26.04 LTS, …

GPT-5.5
OpenAI’s GPT-5.5 is out with expanded cybersecurity safeguards

Competition to release stronger AI models is accelerating, and just weeks after the release of GPT-5.4, OpenAI has introduced GPT-5.5, pointing to expanded safeguards in the …

Kaja Ciglic
AI is speeding up nation-state cyber programs

In this Help Net Security interview, Kaja Ciglic, Senior Director, Cybersecurity Policy and Diplomacy at Microsoft, discusses how nation-state cyber programs have changed over …

Android
A study of 1,000 Android apps finds a privacy policy logging gap

Android developers write log statements for the same reasons they always have: debugging crashes, tracing performance issues, and understanding how features behave in …

money hardware
IT spending to hit $6.31 trillion record, thanks to AI

Global spending on IT is expected to reach $6.31 trillion in 2026, according to the latest quarterly forecast from Gartner, marking a 13.5% increase from the previous year. …

development
Where AI in CI/CD is working for engineering teams

Developers have folded AI into daily coding work. Still, the same tools remain largely absent from the systems that validate and ship software. New research from JetBrains …

North Korea
With AI’s help, North Korean hackers stumbled into a near-undetectable attack

For many years, state-sponsored hacking was defined by human expertise in finding security holes, writing malware and exploits, pulling off social engineering and phishing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools