APRA to modernise data stack with Databricks on Azure
The Australian Prudential Regulation Authority (APRA) is set to modernise its data stack and governance architecture, underpinned by a new platform built with Databricks on…
The Australian Prudential Regulation Authority (APRA) is set to modernise its data stack and governance architecture, underpinned by a new platform built with Databricks on…
The acting head of the Cybersecurity and Infrastructure Security Agency faced pointed questions from lawmakers Wednesday over CISA personnel decisions and staffing levels. Members of…
PcComponentes, a major technology retailer in Spain, has denied claims of a data breach on its systems impacting 16 million customers, but confirmed it suffered…
A critical security alert regarding an active phishing campaign that commenced on January 19, 2026. The malicious actors are impersonating LastPass support staff and sending…
On Sunday night, January 18, 2026, the usual programs on several Iranian TV stations were cut short by an unexpected visitor. For roughly ten minutes…
The European Commission has proposed a new cybersecurity legislative package that proponents say will strengthen the security of the EU’s Information and Communication Technologies (ICT)…
Jeff Bezos’ space company Blue Origin has announced a plan to deploy 5408 satellites in space for a communications network that will serve data centres,…
Critical security patches addressing five vulnerabilities across versions 18.8.2, 18.7.2, and 18.6.4 for both Community Edition (CE) and Enterprise Edition (EE). The patches resolve issues…
A sophisticated phishing campaign distributing a fileless variant of Remcos RAT, a commercial remote access tool offering extensive capabilities, including system resource management, remote surveillance,…
Eightfold AI, a venture capital-backed artificial intelligence hiring platform used by Microsoft, PayPal and many other Fortune 500 companies, is being sued in California for…
A ransomware attack has reportedly exposed confidential internal documents at a major electronics manufacturer. The breach compromises the company’s critical role in Apple’s global supply…
A sophisticated PURELOGS infostealer campaign that weaponizes PNG image files to evade detection.The attack begins with a phishing email disguised as a pharmaceutical invoice containing…