To contribute to this consultative process, Check Point Software Technologies’ Ashwin Ram, from the Office of the CTO, offers ...
Hackers and other threat actors are constantly evolving their tactics and strategies, taking advantage of new technologies to enhance their attacks. Here’s what some of the industry’s best think the ...
While the concept of zero trust is not new, it is yet to be embraced by a significant number of government departments and ...
The data of almost 25,000 United Nations delegates has been allegedly published online after a notorious threat actor ...
It’s been a year of policy firsts for the Australian government, but the new year looks just as challenging for politicians ...
Zscaler’s chief security officer and head of research believes paying a ransom can sometimes be the only option to keep ...
The Fog ransomware operation is another relative newcomer to the world of cyber crime, having first been observed in May 2024 ...
Cyber security is an inherently people-based problem – it’s one thing to wonder how the hackers may adapt in 2025, but what ...
The gang behind GoAnywhere and MOVEit hacking campaigns is at it again with the latest file transfer vulnerability.
RA World ransomware gang lists a New Zealand company as a victim and claims to have stolen 250 gigabytes of internal and ...
Threat actors claim to have exfiltrated almost 30,000 corporate logins for Swiss multinational Nestlé. In a post to a popular ...