Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest ...
WASHINGTON — The U.S. Space Force is moving to modernize the computer networks that underpin its operations, awarding new work under a $12.5 billion Air Force-led contract vehicle designed to overhaul ...
Romania's largest coal-based energy producer, on the second day of Christmas, taking down its IT infrastructure.
CJ Moses, Amazon's chief information security officer, confirmed the discovery in a December 15 analysis, describing the campaign as "a significant evolution in critical infrastructure targeting." ...
In many regards, 2025 proved to be a relatively normal year for the cyber security world as threat actors and security pros continued their long-running cat-and-mouse game, but it was also a stand-out ...
In this year’s review of Computer Weekly’s coverage of IT stories in continental Europe, we feature developments in the Netherlands, France, Norway, Sweden and Spain.
A Chinese-linked threat group identified as “Ink Dragon” is targeting common weaknesses in Internet Information Services (IIS) servers to build a global espionage network that is difficult to track or ...
Cybercriminals are using artificial intelligence to pull off more elaborate schemes. They're targeting everything from ...
TMH and Cerner are offering complimentary access to identity protection services for two years as a result of a data breach ...
Mining difficulty for Bitcoin has risen to 148.2 trillion in the latest 2025 difficulty reset, the highest level since miners ...
Thanks to rapid advances in artificial intelligence, the cybercriminals seeking to dupe you into handing over your retirement ...
Imagine a world where a single cyberattack can disable vital systems, leaving us without power, clean water, or functioning ...