Superannuation funds have until the end of August to identify and flag any residual authentication control weaknesses in their environments…
Erie Insurance and Erie Indemnity Company have disclosed that a weekend cyberattack is behind the recent business disruptions and platform outages…
The increasing digitization of smart buildings presents both unprecedented convenience and significant cybersecurity challenges. With the number of IoT devices globally…
A data broker owned by some of America’s biggest airlines has been selling access to customer flight data to the…
Google appointed an insider to lead its future AI-powered product development, as AI enters a new phase of mainstream adoption, according…
Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown Pierluigi Paganini June 11, 2025 INTERPOL announced that a…
A new attack dubbed ‘SmartAttack’ uses smartwatches as a covert ultrasonic signal receiver to exfiltrate data from physically isolated (air-gapped)…
The urgency stems from requirements imposed by technology partners, which necessitated an accelerated timeline for implementation across all affected products….
Today, cloud environments are more complex than ever. Organizations are navigating multicloud, multi-tenant, multi-national, and multi-business unit landscapes. On top…
Unit 42, Palo Alto Networks’ threat intelligence division, has recently conducted investigations that have revealed a worrying trend: threat actors…
Slack, a Salesforce-owned workplace messaging app, recently blocked other software firms from searching or storing Slack messages, The Information reported,…
More than 20,000 malicious IP addresses and domains linked to information stealers have been taken down in an INTERPOL-coordinated operation…











