Qantas data breach could affect 6 million customers

Qantas has suffered a cyber incident that has lead to a data breach. “The incident occurred when a cyber criminal targeted a call centre and gained access to a... Read more »

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

Google released security patches to address a Chrome vulnerability, tracked as CVE-2025-6554, for which an exploit exists in the wild. Google released security patches to address a Chrome vulnerability,... Read more »

What is business continuity software?

Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Read more »

What is the principle of least privilege (POLP)?

The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what is strictly required to do their jobs. Read more »

What is quantum key distribution (QKD)?

Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Read more »

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added TeleMessage TM SGNL... Read more »

Dutch study uncovers cognitive biases undermining cyber security board decisions

Dutch research reveals how cognitive biases can lead to catastrophic security decisions Read more »

Exabeam Nova Advisor Agent equips security leaders with a real-time strategic planning engine

Exabeam announced a major expansion of its integrated multi-agent AI system Exabeam Nova that now equips security leaders with a real-time strategic planning engine and boardroom communication tool. The... Read more »

Cybersecurity essentials for the future: From hype to what works

Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted.... Read more »

Scamnetic KnowScam 2.0 helps consumers detect every type of scam

Scamnetic releaseed KnowScam 2.0, its flagship product for scam protection and digital identity verification. KnowScam 2.0 builds on everything users already trust — now with major upgrades, including an... Read more »
Subscribe to our Newsletter