Cloud Computing
In 2025, mobile cloud mining platforms leveraging AI and renewable energy sources are transforming US Bitcoin mining, offering accessible, transparent, and sustainable options for users of all levels. In November 2025, Bitcoin cloud mining has emerged as a convenient and increasingly popular route for U.S. users to mine Bitcoin (BTC)…
EU enforces stricter cybersecurity standards for connected devices ahead of 2025 deadline
The European Commission’s CE-Cyber Delegated Act introduces significant security requirements for IoT and wireless products, with compliance deadlines extended to August 2025 amid industry adjustments. The European Commission’s CE-Cyber Delegated Act, introduced under the Radio Equipment Directive (RED), marks a transformative shift in the regulatory framework governing connected devices across…
Cyber espionage group PlushDaemon hijacks software updates via compromised network devices
Researchers at ESET have uncovered a sophisticated cyberespionage campaign by the China-aligned group PlushDaemon, exploiting trusted software update channels and compromised network devices to infiltrate global targets across sectors and regions. Researchers at cybersecurity firm ESET have uncovered a covert and advanced cyberespionage campaign operated by a China-aligned threat group…
EU launches bold investigations into Amazon and Microsoft cloud services amid regulation push
The European Commission has initiated major probes into Amazon Web Services and Microsoft Azure, signalling a new phase of regulation aimed at critical cloud providers despite current thresholds. The investigations could reshape Europe’s cloud infrastructure and set global precedents for digital sovereignty and competition. The European Commission has initiated three…
2026 marks a turning point as agentic AI, quantum computing, and Web 4.0 reshape security and infrastructure
As 2026 approaches, technology leaders face a pivotal year driven by autonomous AI, quantum threats, and new digital interfaces, demanding urgent action to secure the future of industry and national infrastructure. As 2026 approaches, the technological landscape is poised for a profound transformation driven by the convergence of agentic artificial…
UK introduces comprehensive cybersecurity overhaul with wider scope and stricter enforcement
The UK Government has launched the Cyber Security and Resilience Bill, expanding regulatory scope, increasing penalties, and strengthening oversight to combat escalating cyber threats impacting critical infrastructure and vital services. The UK Government has launched its Cyber Security and Resilience Bill to significantly update the existing Network and Information Systems…
Mastercard’s new European cyber resilience hub signals a shift towards proactive, collaborative threat intelligence
Mastercard has launched a European Cyber Resilience Centre and advanced educational initiatives, aiming to bolster collective cyber defence and protect Europe’s digital economy amid rising sophisticated cyber threats. The evolving landscape of cyber threats demands urgent adaptability, collaboration, and innovation from organisations worldwide. In an exclusive interview, Tina Mirceta, Senior…
A tumultuous week in global defence has seen Canada and the Philippines strengthen ties in the Indo-Pacific, while Middle East conflicts and North Korean provocations highlight ongoing instability, amid concerning signs of renewed nuclear testing debates. A notably eventful week in global military and defense affairs has unfolded, marked by…
As organisations seek robust cybersecurity solutions, the search for effective Managed Detection and Response (MDR) providers grows increasingly competitive, with Alert Logic facing an array of alternatives in 2026. This landscape features 11 key competitors, each offering distinctive approaches to detection, threat hunting, incident response, and integration capabilities, tailored to…
Cisco has addressed two critical flaws in its UCCX platform, emphasising the urgent need for users to apply patches to prevent severe security breaches amid a rising tide of cyber threats targeting enterprise communications. Cisco has addressed two critical vulnerabilities affecting its Unified Contact Center Express (UCCX) platform, urging users…
Google uncovers PROMPTFLUX, an AI-driven malware evolving in real time to evade detection
Researchers at Google have discovered PROMPTFLUX, a pioneering malware that dynamically rewrites its code using large language models, signalling a new era of autonomous cyber threats that challenge existing detection methods. Researchers at Google’s Threat Intelligence Group (GTIG) have uncovered an experimental malware family, dubbed PROMPTFLUX, which represents a striking…
Samourai Wallet developers face charges amid debates over privacy and crime facilitation
The developers behind privacy-focused Bitcoin wallet Samourai face maximum five-year prison sentences after pleading guilty to conspiracy charges, amid ongoing debates over crypto privacy tools and their role in facilitating illicit activities. US prosecutors are seeking the maximum five-year prison sentences for Keonne Rodriguez and William Lonergan Hill, the developers…
Editors Picks
Latest Articles
Subscribe to News
Get the latest news, reports and updates directly to your inbox.
Subscribe to Updates
Get the latest news, reports and updates directly to your inbox.

