News
How to effectively manage shadow AI usage without slowing innovation
11+ hour, 16+ min ago (895+ words) A strategic battle is unfolding across the cybersecurity landscape. At issue is whether organisations should restrict the use of "shadow AI" " unsanctioned artificial intelligence tools adopted by employees "and risk constraining innovation, or permit broader experimentation while absorbing the heightened…...
Bitdefender identifies new malware attack model
11+ hour, 51+ min ago (287+ words) The attack model, dubbed "vibeware, is likely being utilised by notorious Pakistan-based threat actor APT36. It involves producing a high-volume mass of implants developed using niche programming languages such as Nim, Zig and Crystal. By utilising malicious tools developed by large…...
TeamViewer integrates further with Microsoft Intune
5+ day, 3+ hour ago (187+ words) As part of the enhanced integration, IT teams will no longer need to switch tools to use both platforms. The function builds on Microsoft Entra ID and Intune security policies to enable conditional access enforcement, centralised auditability, and compliance-ready remote…...
Genetec launches cloud-native physical security tool
6+ day, 3+ hour ago (238+ words) Genetec has launched a cloud-native appliance aimed at setting a new standard for physical security. It is built on an open architecture capable of supporting a range of third-party devices including cameras, access control systems and intrusion panels. Cloudlink 2210 supports…...
VAST Data partners with CrowdStrike to secure AI stack
1+ week, 3+ hour ago (242+ words) AI operating system company VAST Data has entered into a collaboration with CrowdStrike aimed at helping secure enterprise AI, analytics and multi-tenant environments at the foundational data level. Under the agreement, the companies will combine VAST's native data-layer governance and…...
Critical alert: exploitation of Cisco SD-WAN appliances
1+ week, 5+ day ago (337+ words) The Australian Cyber Security Centre (ACSC) last night (26 February) released a critical alert that malicious cyberthreat actors are targeting SD-WANs of organisations globally thorough an exploitation of Cisco Software-Defined Wide Area Network (SD-WAN) technology, including via CVE-2026-20127. Those organisations using…...
Tenable warns of supply chain attack on npm Registry
1+ week, 6+ day ago (301+ words) Tenable Research has uncovered a supply chain attack on the npm Registry which the company said demonstrates the speed at which modern supply chain risks can propagate. The npm Registry is a public collection of packages of open-source code for…...
Cloudflare adds post-quantum support to SASE platform
2+ week, 3+ hour ago (240+ words) Cloudflare has become what it says is the first secure access service edge (SASE) solution provider to support post-quantum encryption standards across its entire Cloudflare'One SASE platform. It could also help protect organisations from the growing trend of "harvest now,…...
ASD launches malware analysis tool on GitHub
2+ week, 3+ hour ago (213+ words) The Australian Signals Directorate (ASD) has announced the public release of its open'source malware analysis tool called Azul. ASD says that Azul enables government and private sector partners to collaborate on threat understanding, quickly identify common malware behaviours, and improve…...
Akamai and NVIDIA develop OT security solution
2+ week, 1+ day ago (250+ words) Akamai has collaborated with NVIDIA to develop a solution for providing zero trust segmentation capabilities for operational technology and industrial control systems. Eliminating the need to rely on software agents will enable the use of the solution by specialised controllers…...