Intelligent Waves’ (IW) Shadow, an Autonomous Pen-Testing Platform, Was Recognized as the 2025 Global InfoSec Awards’ Trailblazing Cyber Defense Solution of the Year

Summary Intelligent Waves (IW) has announced that its innovative autonomous penetration testing platform, Shadow, has been awarded the title of Trailblazing Cyber Defense Solution of the Year at the 2025 Global InfoSec Awards. This recognition highlights IW’s dedication to providing advanced solutions for evolving cybersecurity needs in both government and enterprise sectors. Shadow stands out […]

Read More →

Cyber Security | UK Regulatory Outlook April 2025

Summary The UK government has published the Cyber Security and Resilience Bill policy statement, outlining new measures aimed at enhancing the nation’s cyber security landscape. These proposed regulations target managed service providers and critical suppliers to bolster cybersecurity frameworks. The statement suggests empowering regulators with advanced oversight capabilities and new reporting obligations, alongside a focus […]

Read More →

CyberAegis teams win two CyberPatriot national titles

The CyberAegis teams showcased their exceptional skills in cybersecurity by clinching two national titles at the CyberPatriot competition. The coach, Paul Johnson, celebrated their victory in both the Middle School and Open Division, highlighting the dedication and teamwork displayed throughout the intense season. Source: CyberAegis National Titles Article Key Points CyberAegis secured titles in both […]

Read More →

Resignation of the government: the impact on pending legislation

The recent resignation of the government following a failed motion of confidence has sparked significant changes in the legislative landscape. The President’s decision to dissolve Parliament means that ongoing legislative processes, particularly in tech areas like cybersecurity, artificial intelligence (AI), and data, are now in limbo. This will likely delay crucial proposals until the beginning […]

Read More →

Researchers find numerous Apple AirPlay vulnerabilities allowing “wormable” exploits over Wi-Fi

Security researchers have discovered major vulnerabilities in Apple’s AirPlay protocol that may allow attackers to hijack devices without user interaction. This exploit, known as “AirBorne,” comprises 23 individual bugs, of which 17 have official CVEs, enabling zero-click remote code execution on susceptible systems. Cybersecurity firm Oligo has identified multiple critical flaws in Apple’s native AirPlay […]

Read More →

Zero Trust everywhere: How MGM Resorts found agility and security with Zscaler

In a world where cybersecurity breaches feel relentless, MGM Resorts is breaking the mould by embracing a zero trust approach with Zscaler. This case study showcases how the hotel and entertainment giant has adopted modern security frameworks to enhance agility and maintain robust cybersecurity across its diverse operations. Source: CIO Key Points MGM Resorts is […]

Read More →