04
Jun
2025

TXOne Networks unveils intelligent vulnerability mitigation capability

TXOne Networks announced an expanded new version of its SageOne OT Cybersecurity Governance Platform. Already relied upon by many industrial…

Cloud Covered 2025: Cloud Migration
04
Jun
2025

Cloud Covered 2025: Cloud Migration

One of the most significant conundrums faced by any organisation that plans a cloud migration is that there are many…

Solar power hacking
04
Jun
2025

35,000 Solar Power Systems Exposed to Internet

An analysis conducted recently by researchers at cybersecurity firm Forescout showed that roughly 35,000 solar power systems are exposed to…

Cartier disclosed a data breach following a cyber attack
04
Jun
2025

Cartier disclosed a data breach following a cyber attack

Cartier disclosed a data breach following a cyber attack Pierluigi Paganini June 04, 2025 Luxury-goods conglomerate Cartier disclosed a data…

Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages
04
Jun
2025

Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages

Researchers have unearthed a sophisticated supply chain attack targeting Ruby Gems, a popular package manager for the Ruby programming language….

Varonis Identity Protection unifies identity and data security
04
Jun
2025

Varonis Identity Protection unifies identity and data security

Varonis announced Varonis Identity Protection, the latest enhancement to its Data Security Platform that gives organizations visibility and control of…

Brennan
04
Jun
2025

Cloud Covered 2025: Cloud Management

Browse by Chapters Click on the tiles below to navigate the practical realities of the cloud ecosystem.  Cloud Covered Champion…

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
04
Jun
2025

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks

Active Directory (AD) Group Policy Objects (GPOs) are a cornerstone of centralized management for Windows environments, enabling administrators to configure…

Brennan
04
Jun
2025

Cloud Covered 2025: Cloud Engineering & Architecture

Browse by Chapters Click on the tiles below to navigate the practical realities of the cloud ecosystem.  Cloud Covered Champion…

DollyWay World Domination Attack Compromises 20,000+ Sites
04
Jun
2025

DollyWay World Domination Attack Compromises 20,000+ Sites

Since 2016, the “DollyWay World Domination” campaign has quietly compromised more than 20,000 WordPress websites worldwide, exploiting vulnerabilities in plugins…

How to manage your cyber risk in a modern attack surface
04
Jun
2025

How to manage your cyber risk in a modern attack surface

According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76%…

Rethinking governance in a decentralized identity world
04
Jun
2025

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy,…