TLDR: Former CISA Director Jen Easterly claims AI cybersecurity transformation could eliminate the security industry entirely. She argues that most breaches stem from poor software quality, not sophisticated attacks. AI …
Tashina
Tashina
Tashina has been an avid cybersecurity writer for many years. She is passionate about cybersecurity and enjoys learning and writing about the latest trends, issues and challenges in the industry.
-
-
TLDR Microsoft Azure experienced a significant global outage affecting businesses worldwide. The Microsoft Azure outage disrupted critical cloud services. Azure’s Kubernetes Service (AKS) suffered major failures. Users reported widespread connectivity …
-
A high-severity stored cross-site scripting (XSS) vulnerability has been discovered in the MyCourts application, a platform used for tennis court booking and league management. This vulnerability, assigned CVE-2025-57424, affects the …
-
TLDR The Shai-Hulud npm attack represents the first successful self-replicating worm in the JavaScript ecosystem. This npm supply chain attack compromised over 180 packages between September 14-16, 2025. The malware …
-
TLDR The Django Project has released urgent security updates addressing CVE-2025-57833, a high-severity SQL injection vulnerability in the FilteredRelation feature. The flaw affects Django versions 4.2, 5.1, and 5.2, allowing …
-
Apple has issued emergency security updates addressing a critical zero-day vulnerability tracked as CVE-2025-43300. The vulnerability affects iOS, iPadOS, and macOS systems across millions of devices globally. Security researchers report …
- Blog & Articles
UK Age Verification: The Online Safety Act’s Privacy Nightmare
by Tashinaby TashinaThe new UK age verification requirements under the Online Safety Act have sparked one of the largest privacy controversies in digital history. With VPN downloads surging over 1,400% since the …
- Blog & Articles
Companies House Identity Verification: New Rules for Directors
by Tashinaby TashinaThe UK’s corporate landscape faces its biggest transformation in decades. From autumn 2025, over 7 million company directors and beneficial owners must prove their identity to Companies House or face …
-
In a significant development for the cybersecurity community, the Cybersecurity and Infrastructure Security Agency (CISA) has officially confirmed continued funding for the MITRE CVE (Common Vulnerabilities and Exposures Programme). This …
-
The recent CrowdStrike incident has been described as one of the worst IT outages in history. This post covers everything you need to know about what happened, its impact, and …