Optus CTO Tony Baird to depart
08
Jan
2026

Optus CTO Tony Baird to depart

Optus’ chief technology officer Tony Baird is set to leave the carrier and will hand over the role to Telstra…

Dose of uncertainty: experts wary of AI health tech gadgets on display at CES trade show
08
Jan
2026

Dose of uncertainty: experts wary of AI health tech gadgets on display at CES trade show

Health tech gadgets displayed at the annual CES trade show make a lot of promises. A smart scale promoted a…

Three Malicious NPM Packages Attacking Developers to Steal Login Credentials
08
Jan
2026

Three Malicious NPM Packages Attacking Developers to Steal Login Credentials

Three malicious npm packages are targeting JavaScript developers to steal browser logins, API keys, and cryptocurrency wallet data. The packages,…

StackRox: Open-source Kubernetes security platform
08
Jan
2026

StackRox: Open-source Kubernetes security platform

Security teams spend a lot of time stitching together checks across container images, running workloads, and deployment pipelines. The work…

report-ad-banner
08
Jan
2026

Prosura Cyberattack Disrupts Insurance Services In Australia

Australian insurance provider Prosura is investigating a cyber incident after detecting unauthorized access to parts of its internal systems, which…

Researchers detail Bluetooth headphone attack that can hijack smartphones
08
Jan
2026

Researchers detail Bluetooth headphone attack that can hijack smartphones

Vulnerabilities in a very popular Bluetooth system-on-a-chip (SoC) can be used to indirectly compromise smartphones, researchers at Germany’s Enno Rey…

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
08
Jan
2026

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…

Voice cloning defenses are easier to undo than expected
08
Jan
2026

Voice cloning defenses are easier to undo than expected

Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found…

Print Friendly, PDF & Email
08
Jan
2026

Monitoring and Responding to Security Threats in Production

In the world of modern software engineering, deploying an application to production is no longer the finish line, it’s the…

Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
08
Jan
2026

Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit

Hackers are exploiting VMware ESXi instances in the wild with a zero-day exploit toolkit that chains multiple vulnerabilities for VM…

Chinese Hackers Launch Ongoing Attacks on Taiwan's Critical Infrastructure
08
Jan
2026

Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure

China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts…

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques
08
Jan
2026

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques

LockBit has solidified its position as the most prolific ransomware-as-a-service (RaaS) operation globally, accounting for approximately 21% of all documented…