330
320
2025 was the year of online safety laws β but do they work?
New laws in the UK, Australia and France were brought in during 2025 with the aim of protecting children from harmful content online, but experts remain divided on whether they will achieve this goal
310
212
1Password integrates with Cursor to secure AI-driven development workflows
Cybersecurity and password service providerΒ 1Password LLCΒ today announced a new partnership with artificial intelligence code editor company Cursor Inc. to bring secure, just-in-time secrets to Cursor. The partnership has started with the deployment of a Hooks Script that gives developers a secure, β¦
222
Analysing Multidisciplinary Approaches to Fight Large-Scale Digital Influence Operations
arXiv:2512.15919v1 Announce Type: new
Abstract: Crime as a Service (CaaS) has evolved from isolated criminal incidents to a broad spectrum of illicit activities, including social media manipulation, foreign information manipulation and interference (FIMI), and the sale of disinformation toolkits. Tβ¦
Abstract: Crime as a Service (CaaS) has evolved from isolated criminal incidents to a broad spectrum of illicit activities, including social media manipulation, foreign information manipulation and interference (FIMI), and the sale of disinformation toolkits. Tβ¦
222
UK government acknowledges it is investigating cyber incident after media reports
The British government says it is investigating a βcyber incidentβ following news reports that hackers linked to China have gained access to thousands of confidential documents held by the Foreign, Commonwealth and Development Office
210
UK government confirms Foreign Office cyber attack
Reports blame Chinese hacking group but minister insists the source of the attack is unclear
222
Donβt get scrooged: Your essential guide to spotting and stopping holiday scams
Keep your information safe from festive hacks or secret scammers this holiday season.
323
Penetration Testing of Agentic AI: A Comparative Security Analysis Across Models and Frameworks
arXiv:2512.14860v1 Announce Type: new
Abstract: Agentic AI introduces security vulnerabilities that traditional LLM safeguards fail to address. Although recent work by Unit 42 at Palo Alto Networks demonstrated that ChatGPT-4o successfully executes attacks as an agent that it refuses in chat mode, β¦
Abstract: Agentic AI introduces security vulnerabilities that traditional LLM safeguards fail to address. Although recent work by Unit 42 at Palo Alto Networks demonstrated that ChatGPT-4o successfully executes attacks as an agent that it refuses in chat mode, β¦
99
Large Language Models as a (Bad) Security Norm in the Context of Regulation and Compliance
arXiv:2512.16419v1 Announce Type: new
Abstract: The use of Large Language Models (LLM) by providers of cybersecurity and digital infrastructures of all kinds is an ongoing development. It is suggested and on an experimental basis used to write the code for the systems, and potentially fed with sensβ¦
Abstract: The use of Large Language Models (LLM) by providers of cybersecurity and digital infrastructures of all kinds is an ongoing development. It is suggested and on an experimental basis used to write the code for the systems, and potentially fed with sensβ¦
109
Is your Roku or Fire TV streaming device tracking you? It's possible - how I put an end to it
Streaming devices, such as Fire TV Sticks and Chromecasts, collect personal data for various purposes. If that makes you uneasy, here's how to regain some control.
231
Tech provider for NHS England confirms data breach
U.K.-based healthcare tech provider DXS International said it discovered and contained a data breach on Sunday. A ransomware gang took credit for the breach.
219
New Somalia e-visa security flaw puts personal data of thousands at risk
Al Jazeera finds Somaliaβs electronic visa website lacks proper security, allowing anyone to download sensitive data.
230
Cybersecurity skills in new graduates: a Philippine perspective
arXiv:2512.14778v1 Announce Type: new
Abstract: This study investigates the key skills and competencies needed by new cybersecurity graduates in the Philippines for entry-level positions. Using a descriptive cross-sectional research design, it combines analysis of job listings from Philippine onlinβ¦
Abstract: This study investigates the key skills and competencies needed by new cybersecurity graduates in the Philippines for entry-level positions. Using a descriptive cross-sectional research design, it combines analysis of job listings from Philippine onlinβ¦
208
Improve your cybersecurity for just $10 with this VPN deal
Take your cybersecurity more seriously in 2026 with this 5-year subscription to AdGuard VPN, on sale now for $49.99 (reg. $359.40).
109
Data Centers Integrate Cyber and Physical Security in 2025
Explore the year's insights and tactics for reducing risk amid AI-driven threats and tight budgets.
213
Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries
arXiv:2511.17874v2 Announce Type: replace
Abstract: LLM applications (i.e., LLM apps) leverage the powerful capabilities of LLMs to provide users with customized services, revolutionizing traditional application development. While the increasing prevalence of LLM-powered applications provides usersβ¦
Abstract: LLM applications (i.e., LLM apps) leverage the powerful capabilities of LLMs to provide users with customized services, revolutionizing traditional application development. While the increasing prevalence of LLM-powered applications provides usersβ¦
234
ShinyHunters claims theft of Pornhub Premium user data in extortion attempt
Infamous hacking group ShinyHunters has claimed responsibility for the theft of a large dataset tied to Pornhub Premium users, threatening to leak or sell the information unless the company pays a ransom. The hack of PornHub was first revealed by the adult video website on Dec. 12, which it describeβ¦