TechDay UK - The United Kingdom's technology news network

Security vulnerabilities stories

Ps pascal geenens headshot 1  large
The risky race to AI: How DeepSeek is reshaping the AI landscape
Yesterday
#
data protection
#
breach prevention
#
ai security
Chinese startup DeepSeek's new AI model cuts costs but sparks global security fears, prompting bans and cyberattacks amid geopolitical tensions.
Realistic photo networked office printer digital security warnings modern workspace
Multiple brother devices: Multiple vulnerabilities (FIXED)
Yesterday
#
firewalls
#
network security
#
cybersecurity
Security researcher Rapid7 has uncovered 8 vulnerabilities in 742 printer models from Brother, FUJIFILM, Ricoh, and Toshiba, with fixes now available.
Modern office building split ai digital patterns and cracked security shields
Growing gap revealed between AI innovation & enterprise security
Yesterday
#
devops
#
supply chain
#
apm
A new report reveals a widening gap between AI innovation and enterprise security, with 36% of firms struggling to keep up with generative AI risks.
Digital security shield protecting interconnected app icons data streams
Outpost24 identifies key OAuth risks & best practice solutions
Last week
#
application security
#
iam
#
breach prevention
Outpost24 reveals seven common OAuth risks and offers best practices to help organisations prevent unauthorised access and data breaches through better token security.
Dark cloud over data servers glowing locks keys floating away risk
Poor cloud security leaves secrets & data at risk, report finds
Last week
#
hyperscale
#
public cloud
#
cloud security
A report finds poor cloud security and misconfigurations put sensitive data and secrets at risk across major public cloud providers worldwide.
Illustration smartphone laptop warning symbols fish hooks masked figures cyber threats apple devices
Jamf report finds phishing & infostealers surge on Apple devices
Last week
#
malware
#
endpoint protection
#
mdm
Jamf's Security 360 Report reveals a sharp rise in phishing and infostealers targeting Apple devices, urging organisations to strengthen cybersecurity measures.
Shield overlaying computer monitor with code lines symbolizing security
Azul enhances Java security detection, cutting false positives by 99%
This month
#
saas
#
devops
#
application security
Azul's new Java security tool cuts false positives by 99%, boosting detection accuracy and helping DevOps teams focus on real risks in production code.
Fishing hook email phishing threats targeting new zealand map illustration
Just 3% of New Zealand domains enforce top anti-phishing policy
This month
#
edutech
#
data protection
#
phishing
Just 3% of New Zealand domains enforce the strict DMARC p=reject policy, leaving most vulnerable to phishing despite upcoming government mandates.
Laptop connected to cloud icons with gears and automation symbols it automation cloud endpoint
Aiden Technologies now available in Azure Marketplace via MACC
This month
#
paas
#
iaas
#
it automation
Aiden Technologies is now available in the Microsoft Azure Marketplace via MACC, enabling organisations to acquire its endpoint management platform using existing Azure funds.
Healthcare data security stethoscope server padlock uk flag motif
AI use surges in UK healthcare as data security concerns mount
This month
#
data protection
#
iot
#
ai
AI use in UK healthcare has soared to 94% in 2025, despite rising data breaches and declining focus on data security among IT professionals.
Browsers
3 key challenges in enterprise browser adoption: Lessons from Arc's pivot
This month
#
crm
#
digital transformation
#
ai
Despite Arc’s innovation, enterprises struggle with browser adoption due to muscle memory, maintenance burdens, and AI-driven fragmentation disrupting standardisation.
Professional tech team analyzing security threats digital business logic cybersecurity
OWASP unveils first top 10 business logic abuse threats list
This month
#
application security
#
cybersecurity
#
software development
OWASP has released its first Business Logic Abuse Top 10, spotlighting critical cross-domain threats beyond traditional technology-specific vulnerabilities.
Modern uk office employees working with printers computers highlight security vulnerability
UK businesses neglect printer security despite rising risks
This month
#
it training
#
data privacy
#
sharp
Despite rising cyber threat awareness, only 14% of UK employees trained on security receive printer-specific training, leaving devices vulnerable.
Centralized network control panel managing dns multicloud cybersecurity
Akamai launches DNS Posture Management for multicloud security
This month
#
firewalls
#
ddos
#
hyperscale
Akamai has launched DNS Posture Management, offering centralised control over DNS assets across multicloud platforms to enhance security and compliance.
Digital illustration uk european security analyst analyzing cyber threats
Distology partners with Flare to boost threat intelligence tools
Last month
#
ransomware
#
partner programmes
#
apm
Distology partners with Flare to enhance threat intelligence and dark web monitoring for UK and European security resellers and MSSPs.
Digital illustration supply chain linked chains boxes data symbols breaking spill
Adidas data breach highlights supply chain risk for retailers
Last month
#
data protection
#
phishing
#
martech
Adidas has suffered a data breach via a third-party provider, exposing customer information and highlighting rising cyber risks in retail supply chains.
Techday f 6ff748a261669589bbaa
Picus launches tool for real-time validation of exploitable risks
Last month
#
devops
#
advanced persistent threat protection
#
soc
Picus Security launches Exposure Validation, a tool using real-time attack simulations to identify which vulnerabilities are truly exploitable in organisations.
Techday f a9045e5e4f8aaafc236b
Google DeepMind reveals new strategy to defend Gemini 2.5 AI
Last month
#
ai security
#
llms
#
cybersecurity
Google DeepMind has unveiled a new strategy to bolster Gemini 2.5 AI against indirect prompt injection attacks, enhancing its security and resilience.
Techday f a8cac32e79760ff5357c
Fintech sector faces mounting third-party security breach risks
Last month
#
mfa
#
fintech
#
application security
Nearly 42% of data breaches in top fintech firms stem from third-party vendors, highlighting critical supply chain vulnerabilities despite strong internal security.
Techday f 9338fbf3cf2519c5dc34
Cybercriminals industrialise attacks on hospitality sector, report finds
Last month
#
ransomware
#
digital transformation
#
cybersecurity
Cybercriminals increasingly target Australia's hospitality sector, exploiting digital gaps with sophisticated attacks and dark web services, Trustwave warns.