Friday, January 2, 2026

Keep Your Ubuntu-based VPN Server Up to Date

Enterprise-Grade Security for Small Businesses with Linux and Open Source

Ethics for Ephemeral Signals – A Manifesto

When Regex Falls Short – Auditing Discord Bots with AI Reasoning Models

Cisco Live 2025: Bridging the Gap in the Digital Workplace to Achieve ‘Distance Zero’

Agentforce London: Salesforce Reports 78% of UK Companies Embrace Agentic AI

WhatsApp Aims to Collaborate with Apple on Legal Challenge Against Home Office Encryption Directives

AI and the Creative Industries: A Misguided Decision by the UK Government

CityFibre Expands Business Ethernet Access Threefold

Watch out for scammers posing as NCSC agents offering CrowdStrike services

The 19 July Microsoft outage has caused a surge in opportunistic cyber criminals taking advantage of the situation, according to security agencies. Despite the outage not being a result of malicious activity, organisations are advised to remain vigilant. Phishing attempts referencing the outage have already been observed, prompting warnings from the UK’s National Cyber Security Centre, the US Cybersecurity and Infrastructure Security Agency, and the Australian Cyber Security Centre. Financially motivated threat actors are expected to launch targeted attacks in the coming days and weeks, including phishing campaigns and social engineering tactics. CrowdStrike has confirmed fake updates circulating, including a malicious ZIP archive containing a remote access Trojan. To avoid falling victim to these opportunistic exploits, organisations are urged to strictly follow official remediation advice and communicate with CrowdStrike representatives through official channels.