Cyber Risk Management

How Did Cl0p Exploit Oracle EBS to Breach GlobalLogic?

Business Perspectives

How Did Cl0p Exploit Oracle EBS to Breach GlobalLogic?

In an era where digital infrastructure underpins nearly every aspect of business, a staggering data breach at GlobalLogic, a Hitachi-owned software giant, has sent shockwaves through the cybersecurity community. With personal data of over 10,000 empl

Hackers & Threats Synnovis Ransomware Attack Sparks NHS Crisis and Criticism

In a chilling reminder of the vulnerabilities within critical healthcare systems, a ransomware attack on Synnovis, a key pathology provider for the NHS, has left a lasting scar on London's healthcare landscape since its occurrence in June 2024, exposing significant weaknesses. The breach,

Synnovis Ransomware Attack Sparks NHS Crisis and Criticism
Business Perspectives How Can Collaboration Combat Rising Fraud in the UK?

Fraud has emerged as a staggering challenge in the UK, with the National Crime Agency (NCA) reporting that it accounts for 40% of all crime, and a staggering 67% of these incidents are cyber-enabled. This pervasive issue is not just a statistic but a growing threat to the economy, public trust, and

How Can Collaboration Combat Rising Fraud in the UK?
Security Aiphone Transforms Security with Innovative Cloud Technology

In the ever-evolving world of cybersecurity and cloud technology, few bring as much insight as Malik Haidar. With a career spanning multinational corporations, Malik has become a leading expert in combating digital threats through innovative analytics, intelligence, and security strategies. His

Aiphone Transforms Security with Innovative Cloud Technology
Business Perspectives Can Zero Trust Secure IoT and OT from Rising Threats?

In an era where connectivity drives innovation, the proliferation of IoT (Internet of Things) and OT (Operational Technology) devices has created a double-edged sword, offering unprecedented efficiency while exposing critical systems to escalating cyber threats. According to the Zscaler ThreatLabz

Can Zero Trust Secure IoT and OT from Rising Threats?
Analytics Intelligence Was the Malicious Npm Package a Real Threat or a Test?

In the ever-evolving landscape of cybersecurity, a recent incident involving a malicious npm package named "@acitons/artifact" has sent ripples through the open-source community, raising urgent questions about software supply chain security. With over 47,000 downloads before its removal,

Was the Malicious Npm Package a Real Threat or a Test?
Security How Are Boards Mastering Cyber Risks with Governance?

In an era where digital threats loom larger than ever, boards of directors are grappling with a sobering reality: cyber risks are no longer confined to the IT department but pose existential challenges to an organization’s reputation, financial stability, and operational continuity. The stakes have

How Are Boards Mastering Cyber Risks with Governance?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address