Can AI agents catch what your SOC misses?
A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the…
A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the…
Sep 02, 2025Ravie LakshmananCryptocurrency / Malware Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop…
A sophisticated new keylogger malware dubbed “TinkyWinkey” that is targeting Windows systems with advanced stealth capabilities and comprehensive data exfiltration features. First observed in late…
Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity from “a tactical IT consideration…
The NSW government is to start using artificial intelligence to speed up assessments of state significant developments, which include data centres and housing developments. The…
The Department of Health, Disability and Ageing is preparing to consolidate its end-to-end cyber security operations into a single provider as part of a broader…
Cybersecurity company Zscaler has confirmed it fell victim to a widespread supply-chain attack that exposed customer contact information through compromised Salesforce credentials linked to marketing…
In today’s rapidly evolving technological landscape, artificial intelligence (AI) is revolutionising the way we live and work. Schneider Electric, a global leader in energy management…
As the demand for artificial intelligence (AI) continues to soar, organisations are faced with the challenge of rapidly expanding their data centre infrastructure to support…
DuluxGroup has started using a retail execution tool made by SAP to audit Bunnings stores that sell its DIY wares nationally, helping it solidify its…
Security’s Silent Revolution: How StrikeReady is Transforming SOC Operations Security operations centers (SOCs) have long been the unsung heroes of cybersecurity, battling endless alerts and…
“Strategy typically breaks down because it doesn’t leave the boardroom,” Swan says. “We see this gap between strategy and execution, and it often comes down…