Qualcomm’s Guardian Could Rival Intel vPro But Always-On Connectivity Raises Risks
Qualcomm’s Guardian aims to rival Intel vPro with always-on device control via built-in cellular connectivity, but the tradeoff may threaten privacy and trust.
Qualcomm’s Guardian aims to rival Intel vPro with always-on device control via built-in cellular connectivity, but the tradeoff may threaten privacy and trust.
Two British teenagers have pleaded not guilty to serious Computer Misuse Act charges over a 2024 cyberattack on Transport for London, an intrusion that disrupted digital services, exposed customer data and allegedly cost the authority about £39 million. Their case now sits at the intersection of teen cybercrime, critical-infrastructure risk and the UK’s toughest penalties for hacking.
GPT-5.1 Codex-Max can now code independently for hours inside terminals, IDEs and Windows environments. That jump from helper to autonomous coding agent dramatically changes the threat model, turning AI-generated patches, permissions and pipelines into first-class security concerns.
Within four weeks, AWS, Azure and Cloudflare all suffered major outages triggered by internal configuration and metadata failures rather than attacks. This article unpacks the Cloudflare–Azure–AWS outage pattern, examines how cloud centralisation amplifies these incidents and outlines realistic resilience moves for IT, SRE and security teams.
A security incident involving the Trust Wallet Chrome extension shows how attackers can abuse browser extension architecture to compromise cryptocurrency wallets and silently expose user funds.
The FCC has rolled back core ISP cybersecurity rules that were introduced after the Salt Typhoon telecom espionage campaign. With China-linked hackers still probing carrier infrastructure, enterprises must treat telecom exposure as a high-risk dependency and reinforce their own defenses instead of assuming federal safeguards will protect them.
Microsoft 365 suffered a widespread outage across Australia, causing authentication failures, email disruptions and Teams connection issues. Although services gradually recovered, the incident exposed cloud reliability concerns for businesses that rely heavily on Microsoft’s ecosystem.
Hackers posing as Medusa agents tried to lure BBC’s Joe Tidy into facilitating a cyberattack, offering him 15–25% of ransom payouts in exchange for his laptop’s access to the network.
This Windows 11 (24H2) hardening guide delivers 20 Group Policy settings you can deploy today. You’ll protect credentials, block ransomware, enforce SMB signing, harden RDP, and tighten audit logging with version-specific notes and quick tests. Roll out in phases, validate with gpresult, and keep exceptions minimal and time-boxed.
When a TikTok video depicting a “wanted: dead or alive” poster of U.S. Attorney General Pam Bondi appeared, major platforms responded. This article unpacks how TikTok, Google and Comcast cooperated with the FBI, the device and IP information they provided, and the broader implications for how threats on social media become federal investigations.