News

By embedding security into DevOps processes, organisations can reduce risk, maintain compliance & build digital services.
A third-party customer service platform was breached, exposing names, email addresses, phone numbers, dates of birth, and Frequent Flyer numbers.
N. Korean hackers blend social engineering, novel persistence mechanisms & cross-platform coding to infiltrate their targets.
Discover the key cybersecurity steps needed to protect our growing renewable energy infrastructure—and why they matter. Matthias Kohler ...
Ransomware Strike Hits Radix. A breach by the Sarcoma ransomware group has leaked 1.3TB of data, raising concerns over government security.
CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.
Advanced Attack Vectors. GenAI faces threats like prompt injection (manipulating model behavior), data poisoning (tampering with training data), and model extraction (stealing proprietary capabilities ...
A breach in connected devices or automated decision-making have risky consequences. Q&A with Dr Francesca Boem ...
Data breaches, ransomware & emerging vulnerabilities expose the need the need for strong defences as vehicles become more digitally integrated.
The future of AI infrastructure lies in high-throughput, low-latency storage systems built around object storage paradigms. By Paul Speciale ...
A 25-year-old British man named Kai West has been charged by US authorities for allegedly operating under the alias "IntelBroker," a notorious figure in the cybercrime world responsible for a series ...
Threats can become opportunities as cyber strategies shift from a defensive necessity to a proactive business catalyst propelling growth. By Adriaan Bekker ...