
Fujitsu Excluded from Centrica’s Private Sector Deal Amid Backlash from Post Office Scandal
Fujitsu just missed out on a major contract with Centrica, the owner of British Gas. Sources say the Centrica board, worried about potential damage to

Microsoft Takes Action Against Egyptian-Based Phishing Operation
Microsoft’s Digital Crimes Unit just scored a big win against cybercrime. They led an operation that shut down 240 bogus websites linked to an Egyptian

BianLian Cyber Gang Unleashes Ransomware Based on Encryption Techniques
The Australian Cyber Security Centre (ACSC) and the U.S. Cyber Security and Infrastructure Security Agency (CISA) have just released new intelligence about the BianLian ransomware

British National Charged in the US for Scattered Spider Cyber Attacks
The U.S. Department of Justice (DoJ) dropped some serious news yesterday. They filed criminal charges against five people involved in the Scattered Spider cyber attacks,

Nvidia CEO Discusses AI Advancements in Post-Training, Testing, and Gigawatt Energy Initiatives
Nvidia is on a roll, especially in its datacentre business, thanks to the booming demand for AI workloads. In its latest quarterly report, the company
Nvidia Blackwell GPU Production Increases Following Revenue Surge
Nvidia CEO Jensen Huang tackled investors’ worries about the Blackwell GPU overheating by assuring them the data center AI accelerator is in full production, with

US Department of Justice Seeks Sale of Chrome Browser by Alphabet
After winning its antitrust case against Alphabet, the Department of Justice is now pushing to make the tech giant sell its Chrome browser. This follows

Interview with Raymond Boyle, Vice President of Data and Analytics at Hyatt Hotels
Raymond Boyle, the VP of data and analytics at Hyatt Hotels, is all about maximizing the power of data. He joined Hyatt in early 2020,

CMA Approves Google’s Partnership with Anthropic
The Competition and Markets Authority (CMA) has decided not to investigate Alphabet’s partnership with AI startup Anthropic under the merger rules of the Enterprise Act
Understanding Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures, or CVE, is a public catalog listing known security threats. Sponsored by the U.S. Department of Homeland Security, it’s split into

ORG Calls for ICO to Reassess Public Sector Enforcement Strategies
The Information Commissioner’s Office (ICO) is facing criticism from privacy advocates at Open Rights Group (ORG). They argue that the ICO’s practice of only fining

Post Office to Leverage Technology for Automating Financial Redress Payments in Scandal Cases
The teams at the Post Office are diving into technology that could help pay compensation faster for victims of the Horizon scandal. Subpostmasters have been