OEWG 2021-2025 Adopts its Final Report The Open-Ended Working Group on the security of and in the use of information and communications technologies 2021-2025 (OEWG) has reached a significant milestone by concluding its work and adopting its Final Report A/AC.292/2025/CRP.1 on 11 July 2025. This Final Report serves as a comprehensive document that encapsulates the […]
Ukraine strengthens cybersecurity ties with EU
Ukraine Strengthens Cybersecurity Ties with EU In a bid to fortify its cybersecurity measures, Ukraine recently engaged in discussions in Rome with the European Union to bolster their cooperation in the realm of digital security. The talks centered around enhancing cybersecurity ties and laying the groundwork for the establishment of a joint Center of Competence […]
Breaking down the OEWG’s legacy: Hits, misses, and unfinished business
Breaking down the OEWG’s legacy: Hits, misses, and unfinished business The Open-Ended Working Group (OEWG) on cybersecurity, operating from 2019 to 2025, was a pivotal player in shaping global dialogues and policies concerning digital security. However, the critical question lingers – did it truly deliver on its promises? As external experts provide their evaluations of […]
Graphite spyware used against European reporters, experts warn
Graphite Spyware: The Latest Threat to European Reporters Israeli spyware firm Paragon is facing intense scrutiny following revelations that its tool, Graphite, has been deployed in covert operations targeting European journalists. The alarming reports have raised significant concerns among experts and media professionals about the growing risks posed by such advanced surveillance technologies. Graphite, developed […]
Guardz doubles down on SMB protection with $56M funding boost
Guardz Doubles Down on SMB Protection with $56M Funding Boost Guardz, a cybersecurity company dedicated to providing enterprise-grade protection to small and medium-sized businesses (SMBs), has recently made waves in the industry with a significant funding boost. The company has successfully secured $56 million in funding, further solidifying its position as a key player in […]
Massive leak exposes data of millions in China
Massive Leak Exposes Data of Millions in China A recent alarming incident has sent shockwaves through the digital world, as a massive leak exposed the data of millions of individuals in China. The breach, although brief, allowed access to a staggering 16 datasets before mysteriously vanishing. What is even more concerning is that the accessed […]
Colt, Honeywell and Nokia to trial quantum cryptography in space
Colt, Honeywell, and Nokia Join Forces to Trial Quantum Cryptography in Space In the ever-expanding digital landscape, the need for robust cybersecurity measures has never been more critical. With the rise of quantum computing, traditional encryption methods are at risk of being compromised, leading to potential data breaches and security vulnerabilities. Recognizing this pressing issue, […]
Data sovereignty gains ground in the UK
Data Sovereignty Gains Ground in the UK Amid rising geopolitical tensions and digital security concerns, UK tech leaders are rethinking who truly controls their data—and what that means for the nation’s future. In an era where data is often described as the new oil, the concept of data sovereignty is gaining traction in the United […]
AT&T hit by alleged 31 million record breach
AT&T hit by alleged 31 million record breach AT&T, one of the leading telecommunications companies, is facing another major security challenge as reports emerge of an alleged 31 million record breach. If verified, this breach would mark the third significant security incident affecting the company’s customers in less than two years. The potential breach raises […]
Hackers use fake PayPal email to seize bank access
Beware of Fake PayPal Emails: How One Wrong Click Can Lead to a Full-Blown Hack In the digital age, where technology is an integral part of our daily lives, online security has become more crucial than ever. Cybercriminals are constantly finding new ways to exploit unsuspecting individuals, with one of the most common tactics being […]