Telstra and Ericsson to jointly research and test 6G
Telstra will join its long-term equipment partner Ericsson in a program of reciprocal development and testing of 6G technology. The two companies have signed a…
Telstra will join its long-term equipment partner Ericsson in a program of reciprocal development and testing of 6G technology. The two companies have signed a…
The contours of business disruption are changing. It can start with a ransomware incident, an identity compromise, a supplier outage, or a prolonged cloud failure…
Poland shifts away from Signal following cyberattacks on officials’ accounts Pierluigi Paganini May 19, 2026 Poland told officials to stop using the popular instant messaging…
We speak with Qualys Managing Director for ANZ, Sam Salehi in the lead up to their Customer and Channel Partner event in Sydney on 28…
“AI-driven attacks accelerate adversary actions and adaptation, so a slow recovery increases the window for re-compromise,” she adds, warning that extended outages can create cascading…
European law enforcement authorities have dismantled a large-scale online propaganda network linked to Iran’s Islamic Revolutionary Guard Corps (IRGC), removing around 14,200 links as part…
Threat actors love a good phish. In this year’s Data Breach Investigations Report released by Verizon, phishing is named as one of the top four…
When an employee installs an AI writing assistant, connects a coding copilot to their IDE, or starts summarizing meetings with a new browser tool, they…
A major security lapse has exposed highly sensitive U.S. government cloud credentials after a contractor working with the Cybersecurity and Infrastructure Security Agency (CISA) accidentally…
Hackers Abuse Microsoft Entra ID Accounts to Exfiltrate Microsoft 365 and Azure Data. A highly sophisticated cyberattack campaign carried out by a threat actor tracked…
A handful of public Instagram posts can give attackers enough material to generate convincing phishing emails with GenAI. Research from the University of Texas at…
Ravie LakshmananMay 19, 2026Software Security / Malware In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper, to…