Pentest-Tools.com has released a free, no-login scanner for CVE-2026-41940, the critical authentication bypass affecting cPanel & WHM and WP Squared that has been actively exploited in the wild since at least February 2026. The vulnerability, rated CVSS 9.8 Critical and…
Tag: IT SECURITY GURU
Cyber Blind Spots: The hidden technology that poses the greatest security risk
By Peter Villiers, Director of Cyber Risk at Barrier Networks There’s a growing risk across the UK’s Critical National Infrastructure (CNI) that is placing the country at serious risk of disruption. It isn’t ransomware or a headline-grabbing data breach. It…
World Password Day 2026: The Credential Crisis Hasn’t Gone Away, It’s Just Got More Dangerous
Every year, World Password Day arrives with a familiar chorus: use longer passwords, don’t reuse them, enable multi-factor authentication, and every year, attackers walk straight through the same open doors. The advice hasn’t changed dramatically. The threat, however, has, and…
UK Finance Sector Puts Cyber Defences to the Test in National Hackathon
Over the course of two days (April 27-28), banks, fintech companies, technology providers, and regulators from across the UK financial ecosystem came together for a cybersecurity competition designed to test real-world readiness, decision-making under pressure, and the ability to defend…
Majority of IT Leaders Struggle to Manage Growing Identity Footprint Amid AI Expansion
New research from Keeper Security reveals that 89% of IT leaders struggle to manage the growing identity footprint amid AI expansion. The Identity Security at Machine Speed Report features insight from 200 cybersecurity decision-makers and senior IT leaders across Europe,…
Bot Defense Is No Longer Optional for High Tempo Consumer Platforms
The need to deal with bots is not new, though we’re seeing a surge in automated activity across the web at the moment, creating a cavalcade of problems for consumer-facing platforms. Some of this is self-created, although many external factors…
When the Breach Gets In Through the CEO’s Inbox, Not the Firewall
Security teams have put in a lot of effort in the last decade to make sure that security parameters are as robust as possible. Because of this, zero trust frameworks, multi-factor authentication, endpoint detection, patched vulnerabilities have become baseline requirements…
Huntress Expands Channel Partnerships to Boost Cybersecurity Reach Across Mid-Market and Public Sector
Global cybersecurity company Huntress has announced a major expansion of its global channel ecosystem, adding four new distribution partners to accelerate growth across the mid-market, public sector, and EMEA regions. The new partnerships with Ingram Micro, Vertosoft, Liquid PC, and…
Proton Mail rolls out post-quantum encryption for all users as industry braces for ‘harvest now, decrypt later’ threat
Proton Mail has today announced the rollout of post-quantum encryption (PQC) across its email platform, making quantum-resistant key generation available to all users, including those on free plans, in what the company describes as a proactive step ahead of the…
Bridewell Joins Global Incident Response Network FIRST as Full Member
Bridewell has been accepted as a full member of the Forum of Incident Response and Security Teams (FIRST), marking a significant milestone in the company’s incident response maturity and global collaboration capabilities. The UK-based cyber security services provider, which specialises…
86% of Phishing Attacks are AI Driven, KnowBe4 Research Finds
KnowBe4, the digital workforce security provider, securing both AI agents and humans, has announced new research, Phishing Threat Trends Report Volume Seven. The report finds a seismic shift in the attack vectors utilized to conduct phishing attacks, including touchpoints outside…
Lessons from the PocketOS Incident: When AI Agents Go Beyond Their Limits
The reported PocketOS incident, in which an AI agent deleted a live production database and its backups in a matter of seconds, has quickly become a defining moment in the conversation around autonomous systems in enterprise environments. An AI-powered coding…
Forescout Launches Mission:Possible Global Partner Tour to Drive Channel Growth Across 90 Cities
Forescout has unveiled an ambitious new global partner initiative, Mission:Possible, marking the largest channel-focused campaign in the company’s 25-year history. Designed to energize partners and accelerate pipeline growth, the tour will span more than 90 cities worldwide between May and…
Best AI security tools for exposure assessment in 2026
AI is transforming both attacks and defense. To avoid being outstripped by AI-powered adversaries, organizations need platforms that prioritize risk in real-time. Exposure management with AI is the next evolution in comprehensive cybersecurity. AI-powered exposure management, as embodied in continuous…
DORA and the Practical Test of Operational Resilience
By Alan Stewart-Brown, VP EMEA, Opengear Disruption in financial services rarely follows a clean script. A misconfiguration, a spike in malicious traffic, or a poorly timed change can cascade across platforms and teams, particularly where systems and suppliers are…
Beyond the perimeter: Why identity and cyber security are one single story
By James Odom, Director of Cyber, and Jim Small, Director of Identity at Hippo Digital For years, identity and cyber security have been treated as separate disciplines, with identity focusing on authentication, onboarding and access and cyber security focusing…
NCSC chief warns of ‘perfect storm’ as cyber threats intensify at CyberUK
At this week’s CyberUK conference in Glasgow, National Cyber Security Centre (NCSC) CEO Richard Horne delivered a stark assessment of the evolving cyber threat landscape, warning that organisations are facing a “perfect storm” driven by rapid advances in artificial intelligence…
How AI is being used in dentistry
By 2026, artificial intelligence (AI) is playing a growing role in dentistry across the UK, helping practices improve patient management, treatment planning, and overall care. The rise of AI is supporting everyday tasks such as appointment booking, analysing dental images,…
AI and Chatbots Transforming the Future of Consumer Lending
Artificial intelligence (AI) and chatbot technology are rapidly changing the consumer lending landscape, helping financial institutions deliver faster, more efficient, and more personalised services. New insights from Tata Consultancy Services show that digital innovation is reshaping how loans are applied…
Router Security Hardening Steps for 2026: From Default Credential Audits to Automated Firmware Risk Monitoring
Network edge devices are now among the most targeted entry points in cyberattacks. Recent intelligence shows that threat actors are focusing more on routers, firewalls, and VPN concentrators than on end-user machines, a trend highlighted in multiple 2025 threat intelligence…