
Fostering a secure developer experience
“A software supply chain attack occurs when a cyber threat actor infiltrates a software vendor’s network and employs malicious code

“A software supply chain attack occurs when a cyber threat actor infiltrates a software vendor’s network and employs malicious code
Gartner defines Artificial Intelligence (AI) “as applying advanced analysis and logic-based techniques, including machine learning (ML), to interpret events, support

Gartner Sr director analyst Richard Addiscott says business leaders now widely accept that cybersecurity risk is a top business risk

Ransomware activity from CL0P, a newer entrant to the list of top ransomware groups, increased by 65%, according to Nuspire’s

Commvault announced the release of Commvault Platform Release 2023E packed with cutting edge new products and services for businesses that require

Fraudsters use AI chat tools to refine their techniques and expand their coercion tactics, according to a report by Sophos

Ransomware was in the headlines worldwide last year as cyberattacks hit a broad swathe of businesses and organisations, maliciously causing

A new report by Sygnia uncovered that attacks led by the Night Sky and Cheerscrypt ransomware groups originated from the same

A mass-spreading phishing campaign aimed at collecting Zimbra account users’ credentials was detected by ESET researchers. The ongoing campaign has

CyberArk launched its unified CyberArk Identity Security Platform to better protect Indonesian organisations from growing attacks on human and non-human.

Cyber threats like ransomware are increasing, and endpoints are more varied, numerous, and distributed than ever before. By following the

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber