Supply chain related security risks, and how to protect against them
We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition, a supply chain is the…
We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition, a supply chain is the…
Okta, a prominent supplier of solutions for identity and access management, has disclosed that over the last several weeks, its clients have been the victim…
Tyro Payments has launched proceedings against Kounta for allegedly offering a competing product to Tyro merchants, in breach of an arrangement between the two. The…
Westpac is facing a fresh civil suit over IT system and process failures that caused customer hardship notices lodged online to not be passed through…
IBM Australia’s renewed whole-of-government agreement is already worth $900 million, exceeding its initial value within just nine months. An analysis of the 26 contracts struck…
Huawei Technologies and China’s top chipmaker SMIC have built an advanced 7-nanometer processor to power its latest smartphone, according to a teardown report by analysis…
QuickSet and Grid Configurator of Schweitzer Labs were found to be vulnerable to multiple vulnerabilities that threat actors can exploit. Nearly, 9 new vulnerabilities were…
The German Federal Financial Supervisory Authority (BaFin) announced today that an ongoing distributed denial-of-service (DDoS) attack has been impacting its website since Friday. BaFin is…
Multiple Information Disclosure vulnerabilities were discovered in the IBM Security Verify Information Queue, which can reveal several internal product details. This information can then be…
Microsoft Windows announced deprecated features for Windows clients 11 and 10. In this article, we’ll delve into the features and functionalities that are no longer…
The Swedish Authority for Privacy Protection (IMY) has fined insurer Trygg-Hansa $3 million for exposing on its online portal sensitive data belonging to hundreds of thousands of…
Apple launched the Security Research Device (SRD) program, enabling security researchers to examine the security features of a specially-built hardware variant of the iPhone 14…