News
Spotify says piracy activists hacked its music catalogue
2+ hour, 41+ min ago (248+ words) Music streaming service Spotify said Monday it had disabled accounts from a piracy activist hacker group that claimed to have "backed up" millions of Spotify's music files and metadata. The group Anna's Archives said in a blog post it had…...
Amazon says blocked 1,800 North Koreans from applying for jobs
22+ hour, 43+ min ago (452+ words) US tech giant Amazon said it has blocked over 1,800 North Koreans from joining the company, as Pyongyang sends large numbers of IT workers overseas to earn and launder funds. In a post on LinkedIn, Amazon's Chief Security Officer Stephen Schmidt…...
Cyber threats in 2026: Expert reveals what comes next
1+ day, 5+ hour ago (638+ words) Across 2025, even the biggest corporations and governmental institutions, including the U.S., were not immune to hacks. According to Cyble's latest Global Cybersecurity Report 2025, almost 15,000 incidents related to data breaches and leaks were reported. One of the biggest hacks happened to the…...
Ashwin Maniyankode Chandranathan on building intelligent, inclusive, and impactful security systems
4+ day, 5+ hour ago (830+ words) In an era where artificial intelligence, automation, and connected systems are reshaping industries, one truth remains constant and this is that innovation only matters if people can use" it." For Ashwin Maniyankode Chandranathan, a Senior Product Manager specializing in SaaS…...
Cyber risk 2026: How to avoid a business incident?
6+ day, 5+ hour ago (546+ words) Translation layers between tools that were never meant to talk to each other are creating more problems than they solve. As attackers pivot from breaching individual companies to compromising trusted providers, software dependencies, and integration platforms, supply chains will emerge…...
Scaling and securing identity and access management for the cloud era
1+ week, 4+ hour ago (666+ words) Enterprises adopting cloud services face a growing challenge: how to make authentication seamless for users while maintaining system security against account takeover, credential theft, and compliance gaps. Cloud providers have been enhancing their customer identity and access management (CIAM) services…...
Privacy matters: AI security cameras are collecting unnecessary data
1+ week, 5+ hour ago (389+ words) Amazon Ring has recently been criticised by privacy watchdogs over its "Familiar Faces" feature Smart AI security cameras can become a spying tool for hackers. Many devices are also collecting unnecessary amounts of data, which affects privacy and which provides…...
Considerable amounts of dark web material originate from business insiders
1+ week, 6+ hour ago (378+ words) Dark web sale: Advanced packages, which contain even more sensitive user information, such as IP addresses. Bad actors claim to be collaborating with insiders from companies that are household names, such as Facebook, Instagram, and Amazon, to unban accounts or…...
The rise of mobile virtualization protects BYOD deployments
1+ week, 1+ day ago (440+ words) What are the security risks with BYOD at work? According to some analysts, there will be a rise of mobile virtualisation in workplaces to protect bring your own device (BYOD) policy mobile devices. Among those making such predictions is Hypori…...
Why is fast fraud detection crucial for businesses?
1+ week, 1+ day ago (777+ words) Imagine you're at a coffee shop, tapping your card to grab a latte, or a small business owner in Ohio swiping to pay a supplier. These moments seem simple, but they're powered by a vast digital network where every transaction…...