The Offensive Potential of Computer-Using Agents
Recommended for you
![[object Object]](https://a.storyblok.com/f/285531722701318/2000x1300/e475bb4ac5/pexels-pixabay-372470.jpg)
AI Adoption Is Outpacing Governance: Conversations on Managing AI Risk
The TEISS Breakfast Briefing at London’s Goring Hotel brought together senior leaders from finance, legal, professional...
![[object Object]](https://a.storyblok.com/f/285531722701318/2312x1542/bbc3733e0c/pexels-pixabay-34225.jpg)
Scattered Spider and DragonForce: A Case Study in Human-Centric Cyber Threats
In April 2025, large retailers were targeted by cyber attacks that caused disruption across their services. Although att...
![[object Object]](https://a.storyblok.com/f/285531722701318/3880x2475/2e1e578f78/supervisor_image_01.png)
You're Not My Supervisor! Researching My Own New Starter Scam
Within weeks of stepping into a new role, I found myself receiving multiple phishing emails impersonating our CEO. Rathe...