DORA compliance – Why financial firms can’t afford to fall behind
The financial sector is under increasing pressure to strengthen its defences against cyber threats. With digital transformation accelerating, financial institutions...
Read more →The financial sector is under increasing pressure to strengthen its defences against cyber threats. With digital transformation accelerating, financial institutions...
Read more →AI search service Perplexity AI doesn’t just want you using its app—it wants to take over your web browsing experience...
Read more →A sophisticated malware variant masquerading as a legitimate WordPress security plugin has been identified, capable of providing attackers with persistent...
Read more →As quantum computing transitions from theoretical research to practical application, Chief Information Security Officers (CISOs) face an unprecedented challenge to...
Read more →Telecommunications are the lifeblood of the modern world, connecting billions of people and devices. This makes them a prime target for...
Read more →Researchers found a set of vulnerabilities in Apple’s AirPlay SDK that put billions of users at risk of their devices...
Read more →May 01, 2025Ravie LakshmananArtificial Intelligence / Disinformation Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its...
Read more →Microsoft is preparing to increase its European datacentre capacity by 40% over the next two years and will appoint a...
Read more →In today’s hyper-connected business environment, supply chains are no longer just about the physical movement of goods they are digital...
Read more →A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own hacking competition, allows attackers to execute...
Read more →A misconfigured, non-password-protected database belonging to TicketToCash exposed data from 520,000 customers, including PII and partial financial details. Cybersecurity researcher...
Read more →In an online world filled with extraordinarily sophisticated cyberattacks—including organized assaults on software supply chains, state-directed exploitations of undiscovered vulnerabilities,...
Read more →