651 arrested, $4.3 million recovered in African cybercrime sweep

Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million from online scams. In Nigeria police took down a fraud ring that used phishing… Continue reading 651 arrested, $4.3 million recovered in African cybercrime sweep

Poland restricts Chinese-made cars at protected military sites

Poland’s military leadership has decided that cars manufactured in the People’s Republic of China will no longer cross the gates of sensitive military bases. The decision follows a risk analysis focused on the growing integration of digital systems in … Continue reading Poland restricts Chinese-made cars at protected military sites

Adidas investigates alleged data breach affecting 815,000 records

Adidas confirmed it is investigating a possible data breach involving one of its third-party customer service providers. The company stated that there is no indication its IT infrastructure, e-commerce platforms, or consumer data were impacted by the i… Continue reading Adidas investigates alleged data breach affecting 815,000 records

UK sounds alarm on rising cyber risks to businesses

The UK government launched a national campaign urging businesses to strengthen basic cyber defenses. The initiative follows new figures highlighting the scale of the threat. Serious cyber incidents cost businesses an average of £195,000, with about hal… Continue reading UK sounds alarm on rising cyber risks to businesses

Microsoft signals breakthrough in data storage that can last for generations

Microsoft announced progress on Project Silica, its research initiative focused on developing durable, long-term quartz glass-based data storage technology. Close up of Writer showing high-speed multi-beam data encoding on laser pulses (Source: Microso… Continue reading Microsoft signals breakthrough in data storage that can last for generations

Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits

Smart contract exploits continue to drain funds from blockchain projects, even as auditing tools and bug bounty programs grow. The problem is tied to how Ethereum Virtual Machine (EVM) contracts work: code is deployed permanently, runs autonomously, an… Continue reading Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits

Attackers keep finding the same gaps in security programs

Attackers keep getting in, often through the same predictable weak spots: identity systems, third-party access, and poorly secured perimeter devices. A new threat report from Barracuda based on Managed XDR telemetry from 2025 shows that many successful… Continue reading Attackers keep finding the same gaps in security programs

Microsoft Edge 145 lands with major enterprise security upgrades

Microsoft has begun rolling out Edge 145 to the Stable release channel, adding several enterprise-focused security enhancements. The update is being deployed in phases, with some features available through preview and targeted release programs. Edge 14… Continue reading Microsoft Edge 145 lands with major enterprise security upgrades

Claude Sonnet 4.6 launches with improved coding and expanded developer tools

Anthropic released Claude Sonnet 4.6, marking its second major AI launch in less than two weeks. Scores prior to Claude Sonnet 4.5 (Source: Anthropic) According to Anthropic, Sonnet 4.6 delivers improved coding skills to more users. Tasks that once req… Continue reading Claude Sonnet 4.6 launches with improved coding and expanded developer tools

Claude Sonnet 4.6 launches with improved coding and expanded developer tools

Anthropic released Claude Sonnet 4.6, marking its second major AI launch in less than two weeks. Scores prior to Claude Sonnet 4.5 (Source: Anthropic) According to Anthropic, Sonnet 4.6 delivers improved coding skills to more users. Tasks that once req… Continue reading Claude Sonnet 4.6 launches with improved coding and expanded developer tools