Tag: Information Security Buzz

The Real Cyber Awards and Conference opens for entries

Entries have opened for the Real Cyber Awards 2026 and Conference, a UK-based cybersecurity event designed to recognise the organisations and individuals working to keep businesses secure.  Positioned as a platform to highlight “the real work happening in cybersecurity today,”…

Why the cybersecurity skills gap is partly self-inflicted

The cybersecurity skills gap is usually framed as a hiring problem. Organizations respond by expanding recruitment pipelines, investing in certifications, and launching internal training programs. The logic seems simple: if security teams are understaffed, the solution is to add more…

Telehealth company Hims & Hers discloses data breach

Hims & Hers, a telehealth company, has disclosed a data breach involving its third-party customer support ticketing system after hackers gained access between 4 and 7 February 2026.  In a letter to customers, it warned of a data security incident that might have exposed their personal information. …

The European Commission confirms attack on its Europa web platform

The European Commission has confirmed a cyberattack affecting its Europa.eu web platform, with initial reports indicating that the attackers accessed the data from the cloud infrastructure provided by AWS.   The incident was detected on 24 March, with the commission stating that the attack was contained while the investigation…

Enterprise AI security: weighing the benefits and risks in 2026

The integration of artificial intelligence into core business systems, better known as enterprise AI, is moving fast, along with the threats around it. Security teams are confronting AI-powered cyberattacks, tightening global regulations, and facing a growing expectation that cyber defenses…

LiteLLM supply chain attack exposes millions to credential theft

Researchers at Endor Labs, have discovered a supply chain attack on the popular Python package LiteLLM on PyPI, with malicious code injected into versions 1.82.7 and 1.82.8, which have been withdrawn.   The package is used in AI environments and developer tools, with an estimated 95…

Making stolen data worthless: why security must start with the data

Organisations have spent years investing heavily in cybersecurity solutions. Firewalls have been strengthened, identity systems refined, and monitoring tools deployed across increasingly complex environments. Yet despite this, data breaches continue to expose vast amounts of sensitive information, often with severe…

Expert panel: Cyber conflict in a fractured world

No longer are geopolitical standoffs settled on the traditional battlefields of diplomacy and arms; now, the digital realm has emerged as the arena for these conflicts.  In this article, we bring together industry experts to discuss the dynamics of the development of…

New Ubuntu Snap Bug Opens Door to Delayed Root Compromise

A newly disclosed flaw in Ubuntu’s Snap ecosystem is raising fresh concerns about local privilege escalation risks in default Linux environments.  Researchers at Qualys have identified CVE-2026-3888, a high-severity vulnerability that allows a low-privileged local user to escalate access to full root…

Cloud Security Controls Explained: A Definitive Guide

Most teams already have cloud security tools in place. That’s not the issue. The problem is that those tools don’t give you any real control. Infrastructure is built fast, modified constantly, and touched by too many people to track. Code…

UK’s Companies House exposed data linked to millions of firms

Companies House, the UK’s official registrar of companies, has disclosed a security flaw in its WebFiling service that exposed sensitive data tied to more than five million registered businesses.   The issue traces back to a system update rolled out in October 2025 and went unnoticed for five months…