TPG Telecom’s ongoing tech transformation project saw 43 systems decommissioned in 2023, as the company looks to simplify both its…
A hacking group tracked as ‘UAC-0184’ was observed utilizing steganographic image files to deliver the Remcos remote access trojan (RAT)…
Storage and backup investment plans for 2024 show a significant bias towards averting risk and building resilience. At the same…
NSW Police have charged three men following an investigation into an SMS phishing scam operation. Officers from Strike Force Kanbi…
A cyber attack hit Thyssenkrupp Automotive Body Solutions business unit Pierluigi Paganini February 26, 2024 ThyssenKrupp disclosed a security breach that…
Threat actors are exploiting a CMS editor discontinued 14 years ago to compromise education and government entities worldwide to poison…
Despite arrests, infrastructure seizure and international law enforcement efforts, LockBit ransomware has resurfaced, promising robust security and threatening aggressive cyber…
26 Feb SIEM Implementation: Strategies and Best Practices Learn how to optimize your SIEM solution with key strategies and practices….
The government will not automatically include prosecutions of subpostmasters that used the Post Office’s old Capture software within forthcoming legislation…
Lockbit, the cybercrime gang that was knocked offline by a comprehensive international police operation earlier this month, says it has…
Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated,…
Members of the Five Eyes (FVEY) intelligence alliance warned today that APT29 Russian Foreign Intelligence Service (SVR) hackers are now switching to…











