Security
Latest about Security

North Korean 'fake worker' scheme caught live on camera
By Ellen Jennings-Trace published
Researchers trapped Lazarus operators with sandbox environments

Iranian hacker group deploys malicious Snake game to target Egyptian and Israeli critical infrastructure
By Benedict Collins published
MuddyWater has deployed more sophisticated techniques and malware in a string of attacks targeting Israel and Egypt.

New data centers will need almost triple the current energy demand by 2035
By Ellen Jennings-Trace published
Energy use set to skyrocket 300% as AI drives demand.

Russian speaking hacking group now shifting focus to government targets
By Sead Fadilpašić published
The focus is now on stealth, long-term persistence, and cyber-espionage against government and similar organizations.

Huge cryptomixer takedown sees feds seize over $30milion
By Sead Fadilpašić published
Another mixing service bites the dust, but no arrests were made.

4.3 million have installed this malicious browser extension on Chrome and Edge - here's how to check
By Sead Fadilpašić published
After five years, browser extensions turned malicious, putting countless people at risk.

107 Android flaws just got patched by Google - here's how to make sure you're up to date
By Sead Fadilpašić published
Among them are two actively exploited bugs, allegedly used by state-sponsored actors.

Glassworm returns once again with a third round of VS code attacks
By Sead Fadilpašić published
The Visual Studio Marketplace and the Open VSX Registry users are targeted once again with infostealing malware.

Swiss government urges people to ditch Microsoft 365 and others due to lack of proper encryption
By Craig Hale published
A lack of E2EE and sufficient transparency has Switzerland worried about American hyperscalers.
Google's AI-powered Antigravity IDE already has some worrying security issues - here's what was found
By Efosa Udinmwen published
Google’s Antigravity IDE apparently exposes sensitive data through autonomous AI agents, prompt injections, and weak default configurations despite user warnings.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!