When the interface becomes the attack surface
Three recent campaigns (Tsundere, Matrix Push C2, and Sturnus) show attackers shifting command-and-control and data theft into places we treat as harmless UX plumbing.
Read MoreThree recent campaigns (Tsundere, Matrix Push C2, and Sturnus) show attackers shifting command-and-control and data theft into places we treat as harmless UX plumbing.
Read MoreCFOs say they’re confident in their organisation’s ability to handle cyber risk – and more than half plan to outsource cybersecurity expertise.
Read MoreFrom fake celebrity endorsements to cloned voices in mobile scams, 2025 proved that deepfakes are now a real business and consumer risk.
Read MoreAs AI tools move from pilots to the fabric of everyday work, the same systems that boost productivity are leaking sensitive data and stretching identity controls past their limits.
Read MoreAI is now woven into every layer of modern software development, but most security teams can’t see where or how it’s being used.
Read MoreNew data shows the CISO role is already under strain, and heading into an even tougher year.
Read More