29 January 2026
HackerOne has launched Agentic Pentest as a Service (PTaaS), a new approach to penetration testing that combines artificial intelligence (AI) agents with human security experts to provide continuous, adaptive security testing. The company describes this as the first iteration of what it calls “continuous agentic pentesting,” which is part of a broader Agentic Offensive Testing program designed to bridge the gap between traditional manual pentests and fully autonomous security tools.
Find out more29 January 2026
A new industry survey reveals that consumer packaged goods (CPG) companies are prioritizing data and system modernization as they prepare for wider adoption of artificial intelligence. The report, based on insights from more than 150 global CPG IT and operations leaders, underscores the importance of consolidating legacy systems and standardizing data to support scalable AI initiatives across manufacturing and supply chain functions.
The "State of AI in Consumer Goods Report" highlights a significant shift in technology strategy within the sector. A striking 82% of respondents are moving away from fragmented, best-of-breed tools towards unified platforms. This move aims to create a more consistent data environment and streamline processes, which are seen as essential prerequisites for advancing analytics and automation efforts.
Find out more
28 January 2026
A recent study by Splunk reveals that three-quarters (75%) of UK IT teams experienced outages in 2025 due to missed alerts, highlighting a growing crisis in operational resilience driven by alert fatigue.
The global "State of Observability 2025" report, which surveyed 1,855 IT operations and engineering professionals—including 300 in the UK—uncovers the mounting pressures faced by IT teams amid an overwhelming volume of alerts and tool sprawl.
Find out more26 January 2026
KnowBe4 Threat Labs has uncovered a sophisticated phishing campaign that employs stolen login credentials and legitimate Remote Monitoring & Management (RMM) software to gain persistent access to corporate networks. The campaign avoids traditional malware delivery and blends seamlessly into normal IT operations.
The attack operates in two phases. First, attackers send convincing emails that mimic routine workplace communications, such as invitations or notifications. These direct recipients to spoofed sign-in pages that resemble legitimate services, where victims enter their real credentials. The attackers then use these credentials to log into systems through standard channels, reducing the chances of detection.
Find out more



