AT&T Breach 2024: Customer Data Exposed in Massive Cyber Attack
08
Jan
2025

AT&T Breach 2024: Customer Data Exposed in Massive Cyber Attack

In a shocking breach of customer privacy, AT&T said in April 2024 that almost all of the data of its…

BioConnect unveils biometric devices for secure access control
08
Jan
2025

BioConnect unveils biometric devices for secure access control

BioConnect introduced its Arc Series biometric devices. Designed to address the evolving security, compliance, and scalability needs of enterprises and…

Post Office scandal stained Fujitsu orders staff to cut costs amid widening UK losses
08
Jan
2025

Post Office scandal stained Fujitsu orders staff to cut costs amid widening UK losses

Fujitsu has informed staff of cost-cutting measures it has put in place as it faces challenges amid its much-publicised involvement…

Top 5 Industries Most Vulnerable To Cybercriminals In 2025
08
Jan
2025

Top 5 Industries Most Vulnerable To Cybercriminals In 2025

The rise of cyberattacks has changed the dynamics of global industries, with cybercriminals increasingly targeting sectors that hold vast amounts…

Chrome Type Confusion Vulnerability
08
Jan
2025

Chrome Type Confusion Vulnerability Let Attackers Execute Arbitrary Code Remotely

The Chrome team has announced that the Stable channel has been updated to 131.0.6778.264/.265 for Windows and macOS, and 131.0.6778.264…

The Role of AI in Evolving Cybersecurity Attacks
08
Jan
2025

The Role of AI in Evolving Cybersecurity Attacks

In the ever-expanding digital landscape, cybersecurity remains a critical concern for individuals, businesses, and governments alike. As technology advances, so…

The Fundamental Components to Achieving Shift-Left Success
08
Jan
2025

The Fundamental Components to Achieving Shift-Left Success

“Shift-left” is a familiar concept to CISOs and security practitioners across the globe. A term coined to promote the integration…

Print Friendly, PDF & Email
08
Jan
2025

Collective Defence strategies that boost supply chain resilience for all –

Supply chain security has become an increasingly critical concern for businesses and governments alike. In today’s interconnected digital economy, supply…

Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
08
Jan
2025

Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers

CISA has added Mitel MiCollab (CVE-2024-41713, CVE-2024-55550) and Oracle WebLogic Server (CVE-2020-2883) vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog….

Top 5 Malware Threats to Prepare Against in 2025
08
Jan
2025

Top 5 Malware Threats to Prepare Against in 2025

2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to…

GenAI demand fuels record sales of datacentre hardware and software in 2024
08
Jan
2025

GenAI demand fuels record sales of datacentre hardware and software in 2024

Demand for generative artificial intelligence (AI) services is being cited as the reason why spending on datacentre hardware and software…

Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication
08
Jan
2025

Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication

A new security advisory has been released regarding several vulnerabilities in SonicWall’s SonicOS software, which could enable attackers to bypass…