Cybersecurity
-
Chinese hackers breach 700+ companies through single Salesforce integration point
UNC6395's systematic exploitation of Salesloft Drift OAuth tokens reveals dangerous vulnerabilities in enterprise third-party integrations
-
Britain spent £850 million covering up data breaches whilst leaving security gaps unfixed
Exclusive review of secret government report reveals institutional pattern of prioritising political embarrassment over basic security
-
European governments discover their citizens' data remains subject to US law despite sovereignty promises
Microsoft's admission exposes the legal reality behind digital sovereignty claims as European dependence on American cloud infrastructure creates systematic vulnerabilities
-
Allied telegraph operators fought cryptographic warfare through careful rewording
The sophisticated security thinking behind WWII's puzzling paraphrasing requirement
-
Apple patches seven zero-day vulnerabilities in eight months as spyware vendors target journalists
Commercial surveillance companies exploit iPhone flaws while Apple limits security transparency
-
Web security systems recreate browser wars as specialised browsers multiply beyond Chrome and Safari
Over 100 hidden browsers are forcing companies to choose between security and universal access
-
Hyundai charges customers to fix security flaws despite laws requiring free manufacturer responsibility
Automotive giant defies international regulations whilst other industries provide security patches at no cost
-
Britain's cybersecurity experts cannot see the threats coming
Government studies reveal a cybersecurity establishment struggling with prediction, hype, and dangerous knowledge gaps
-
Britain's satellites depend on ground stations moving to the cloud as cybersecurity maturity lags behind critical infrastructure needs
Government study reveals security gaps as space industry adopts shared platforms for controlling essential services
-
HashiCorp Vault's decade-old flaws expose the fragility of enterprise security's most trusted tools
Nine zero-day vulnerabilities discovered through manual analysis reveal how logic flaws can undermine software explicitly designed to be infrastructure trust anchors
-
Why six-digit email codes create more problems than passwords
How companies trying to improve security accidentally made it worse
-
The ransomware ban that criminals want you to pass
Britain's new prohibition will eliminate amateur competitors whilst rewarding precisely those networks sophisticated enough to circumvent legal constraints
-
The great SharePoint abandonment
How Microsoft's cloud gold rush left government agencies defenceless