IT Brief UK - Technology news for CIOs & IT decision-makers

Threat Landscape stories

Flux result f8c260c6 c417 4abd 8bb0 37e6377be18a

Anthropic & OpenAI split on cyber AI release strategy

Today
#
devops
#
hyperscale
#
cloud security
Anthropic and OpenAI take rival paths on AI cyber tools, as one keeps access tightly restricted while the other widens vetted user access.
Jack alexander  senior threat intelligence analyst  quorum cyber

Cyber attacks on universities rise 63% around the world

Today
#
malware
#
edutech
#
firewalls
Universities face a more varied cyber onslaught, with data breaches, hacktivism and ransomware surging as researchers draw nation-state attention.
Flux result e59d91af fbe5 47cd aa0b 25c379752232

HackerOne launches h1 Validation to verify exploitable flaws

Today
#
devops
#
cloud security
#
application security
HackerOne rolls out h1 Validation to help enterprises sort AI-found bugs by real-world exploitability as submissions jump 76% and critical flaws rise.
Flux result ba26dffd 2c48 4e83 87b5 365314843884

ServiceNow completes USD $7.75 billion Armis acquisition

Yesterday
#
firewalls
#
digital transformation
#
cloud security
ServiceNow bolsters cyber security push with Armis buyout, adding real-time asset visibility and deepening its platform after Veza.
Flux result ad42d32c 7135 4932 a4cb b35aca0c1391

HackerOne launches h1 Validation to tackle AI flaws

Yesterday
#
devops
#
digital transformation
#
application security
HackerOne unveils h1 Validation as vulnerability reports surge 76% and AI tools speed up discovery, leaving firms struggling to triage real threats.
James maude

Critical Microsoft vulnerabilities double in yearly report

Yesterday
#
pam
#
cloud security
#
iam
Critical Microsoft flaws double as Azure and Dynamics 365 risks surge, BeyondTrust warns organisations to prioritise identity and privilege controls.
Flux result 39a6fe52 cd41 4db0 ad6c 28f68704fac4

Team Cymru launches Total Insights Feeds for threat data

Last week
#
malware
#
firewalls
#
siem
Team Cymru unveils Total Insights Feeds, a single-stream threat intelligence framework blending internet-wide scoring, context and automated risk tagging.
Flux result d382a159 caf8 4246 8598 ae2a59f512cb

Emerson & OPSWAT strike global reseller deal for OT patching

Last week
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Emerson deepens its cybersecurity push with OPSWAT, adding OT patch management to the Ovation platform as utilities face rising attack pressure.
Cohesity

11:11 Systems named Cohesity's MSP Strategic Partner

Last week
#
data protection
#
dr
#
ransomware
11:11 Systems wins Cohesity FY2025 MSP Strategic Partner of the Year award as joint cyber recovery services gain traction.
Kavitha mariappan  chief transformation officer at rubrik

Rubrik survey warns of AI agents outpacing security

Last week
#
data protection
#
dr
#
digital transformation
Survey finds AI agents are spreading faster than security teams can track them, with most firms lacking visibility, rollback controls and identity governance.
Flux result c244288f 3971 4a58 a524 f465c65cee35

Protectors Edge book applies security lessons to leadership

Last week
#
physical security
#
risk & compliance
#
management
Protective intelligence experts launch leadership book for executives facing rising threats and boardroom pressure.
Flux result 6c691a34 515d 4b81 8e88 0408697cb091

Ransomware activity stays high as new groups surge

Last week
#
ransomware
#
advanced persistent threat protection
#
supply chain
GuidePoint says ransomware attacks stayed elevated in Q1 as The Gentlemen surged, construction became a top target and extortion-only tactics spread.
Flux result 971dadc2 dd8b 4c6e 8468 c707f3c7e678

IBM unveils AI cyber defences against autonomous attacks

Last week
#
digital transformation
#
iot security
#
advanced persistent threat protection
IBM rolls out assessment and multi-agent security services to help large organisations spot AI-driven weaknesses and speed up remediation across complex systems.
Flux result e4336e7b a328 4fd8 a6ca b050d73b6f11

Manufacturing leads ransomware targets in 2025 report

Last week
#
dr
#
vpns
#
ransomware
Manufacturing was the most targeted sector for ransomware in 2025, as Check Point counted 1,466 attacks worldwide amid rising supply chain exposure.
Flux result c7112620 ee78 433f 9a4b 3ca2ccf1b56c

Tenable launches OT asset discovery engine for security

Last week
#
hyperscale
#
cloud security
#
iot security
Tenable adds OT asset discovery to core security tools as Chief Product Officer Eric Doerr says it will expose hidden devices without extra hardware.
Flux result 1fcd6b18 19dc 4e86 b539 9e9da376aba6

TrendAI partners Anthropic to embed Claude in security ops

Last week
#
firewalls
#
digital transformation
#
network security
TrendAI and Anthropic join forces to embed Claude in Vision One, targeting AI vulnerability research and automated cyber defences.
Flux result b53674d2 87f2 4854 b9fb ddd9162c932a

Spitfire launches live cyber attack map after 71,793 probes

Last week
#
firewalls
#
ransomware
#
endpoint protection
Spitfire Network Services unveils a live cyber attack map after its honeypot logged 71,793 probes in 24 hours, spotlighting rising business risk.
Flux result a9728700 c776 49bf 8db8 24a3633e70c0

Cyber teams unready for major attack, Sygnia finds

Last week
#
ransomware
#
digital transformation
#
public cloud
Most companies lack confidence in cyber defences as a Sygnia survey finds major gaps in visibility, coordination and board-level readiness.
Flux result 586ba468 637e 4df3 afb6 b50756bff00b

Synack launches Glasswing readiness test for attack gaps

Last week
#
firewalls
#
devops
#
digital transformation
Synack launches AI-driven assessment to expose overlooked attack surface gaps as offensive tools speed up vulnerability discovery.
Flux result fc523f34 307b 4d62 b451 cd68e47922af

Deepfake report finds US & X lead global incidents

Last week
#
surveillance
#
data analytics
#
biometrics
UK trails US in deepfake threat ranking as identifAI flags X as main spreader and political manipulation as the top use case.