CISOs: Don’t rely solely on technical defences in 2025
Threats have been more sophisticated, unpredictable and harder to pin down. Attackers don’t just exploit technical weaknesses – they target...
Read more →Threats have been more sophisticated, unpredictable and harder to pin down. Attackers don’t just exploit technical weaknesses – they target...
Read more →“Politics makes strange bedfellows” is an old saying that apparently applies to hacktivist groups too. In recent days, Cyble threat...
Read more →The UN technology agency has created a new body to boost protection for submarine cables, aiming to help shore them...
Read more →Iranian threat actors are utilizing a new malware named IOCONTROL to compromise Internet of Things (IoT) devices and OT/SCADA systems used...
Read more →Australia’s government is planning new rules that would charge big tech firms millions of dollars if they did not pay...
Read more →The U.S. State Department is offering a reward of up to $5 million for information that could help disrupt the...
Read more →Western Australia is to review the cyber security capabilities of its entire energy sector in the face of “significant” risks....
Read more →SUMMARY Sanctions on Chinese Firm: The US sanctioned Sichuan Silence Information Technology and employee Guan Tianfeng for exploiting a firewall...
Read more →SUMMARY Global Dismantling of DDoS Platforms: Law enforcement from 15 countries shut down 27 websites offering DDoS attack services as...
Read more →Network security is now an important part of keeping a company safe in this digital age where cyber threats are...
Read more →Google’s first step into the cloud was App Engine, launched in 2008. Google Cloud Storage followed later in 2010. Since...
Read more →Cleo has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software, currently exploited in data...
Read more →