LiteLLM, a massively popular Python library, was compromised via a supply chain attack, resulting in the delivery of ...
With cyber attacks becoming more sophisticated, Hong Kong-based Citic Telecom International CPC faced growing pressure to protect its IT assets. Traditional penetration testing, though essential, was ...
Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and ...
Databricks new Data Intelligence for Cybersecurity, built on the same data lakehouse architecture as the company’s flagship data and AI platform, is designed to help security teams more efficiently ...
Cyber resilience involves the ability to anticipate threats, withstand active attacks, respond quickly to incidents, and recover operations with minimal disruption. Modern cyber threats continue to ...
The Cybersecurity and Infrastructure Security Agency is exploring more diversified funding mechanisms to help cover the cost of a bedrock vulnerability cataloging program that’s been relied upon by ...
A new year brings both fresh and long-standing cyber challenges. The following innovative projects that CISOs are undertaking this year might be worth adding to your own 2026 planning list. As 2026 ...
Organisations that approach cyber security with a “big transformation” mindset increase cyber risk, according to Richard Addiscott, vice-president analyst at Gartner. Speaking at the analyst firm’s ...