Topic: supply chain risk

  • How Supply Chain Sprawl Is Reshaping Security

    How Supply Chain Sprawl Is Reshaping Security

    Businesses face significant cybersecurity risks due to supply chain sprawl, with vendor-related threats being a primary concern, especially for large enterprises and sensitive sectors. A lack of visibility into vendor security practices and outdated risk assessments leave organizations vulnerable...

    Read More »
  • Global Data Breach Risk Soars from Indian Suppliers

    Global Data Breach Risk Soars from Indian Suppliers

    Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...

    Read More »
  • Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program

    Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program

    A mature automotive cybersecurity program requires a foundation in established frameworks like ISO, but must go beyond compliance by developing a tailored risk management strategy that addresses unique threats and deploys proactive controls across the enterprise. Comprehensive threat visibility, ...

    Read More »
  • NPM Malware Attack Exposed 400,000 Developer Secrets

    NPM Malware Attack Exposed 400,000 Developer Secrets

    A malware campaign called Shai-Hulud compromised hundreds of NPM packages, exposing roughly 400,000 raw secrets from thousands of GitHub repositories, with many credentials still active and dangerous. The attack used a self-propagating payload to steal tokens and inject malicious scripts, impacti...

    Read More »
  • BRICKSTORM Returns: Why Your Enterprise Must Boost Cyber Defenses

    BRICKSTORM Returns: Why Your Enterprise Must Boost Cyber Defenses

    The BRICKSTORM espionage campaign targets legal, technology, SaaS, and BPO firms to steal intellectual property and sensitive data, requiring immediate cybersecurity reassessment. Its stealthy infiltration of overlooked infrastructure like network appliances and virtualization platforms allows at...

    Read More »
  • A New Chapter in Cyber Resilience: The Digital As Usual Roadshow in Sydney and Brisbane

    A New Chapter in Cyber Resilience: The Digital As Usual Roadshow in Sydney and Brisbane

    The Digital As Usual: Cybersecurity roadshow in Sydney and Brisbane aimed to shift the conversation about digital threats from a technical issue to a strategic, whole-of-business imperative. The event focused on three key areas: human risk, quantifying cyber risk, and supply chain security.

    Read More »
  • Fake Windows Update Spreads Malware, Salesforce Breach Exposed

    Fake Windows Update Spreads Malware, Salesforce Breach Exposed

    Attackers are using sophisticated social engineering, like fake Windows Update screens, to deliver malware, while a significant breach at Salesforce highlights ongoing supply chain vulnerabilities. The expansion of IoT networks and AI tools introduces novel privacy and security risks, such as dat...

    Read More »
  • Oceania's Tech Pros Brace for AI Risks, Rules, and Resilience

    Oceania's Tech Pros Brace for AI Risks, Rules, and Resilience

    Technology leaders in Australia and New Zealand are prioritizing AI risks, sophisticated cyber threats, and regulatory demands for 2026, amid workforce shortages and rapid technological change. Generative AI and large language models are the dominant technology trend, yet only 8% of organizations...

    Read More »
  • Cybersecurity's Triple Threat: AI, Quantum, Geopolitics

    Cybersecurity's Triple Threat: AI, Quantum, Geopolitics

    Geopolitical tensions and emerging threats are elevating cybersecurity to a top strategic priority, prompting organizations to reassess infrastructure and partnerships. Despite increased budgets and AI investments, low confidence in resilience persists due to legacy systems, reactive spending, an...

    Read More »
  • Putting NICE Guidelines into Practice: Training Insights

    Putting NICE Guidelines into Practice: Training Insights

    SMBs can effectively train employees against cyber threats by focusing on a streamlined, scenario-based program derived from the NICE Framework, targeting the most common attacks like phishing, malware, and web-based threats. The training integrates technical skills with legal knowledge through r...

    Read More »
  • Tech Manufacturer Data I/O Struck by Ransomware Attack

    Tech Manufacturer Data I/O Struck by Ransomware Attack

    Data I/O, a U.S. technology manufacturer, experienced a ransomware attack on August 16, disrupting critical operations including communications, shipping, and production. The company has partially restored some functions but has not provided a timeline for full recovery, and the attack's financia...

    Read More »
  • Avetta Study: Australia's High-Risk Industries Have False Safety Confidence

    Avetta Study: Australia's High-Risk Industries Have False Safety Confidence

    A major gap exists between Australian workers' feeling of safety (90% feel safe) and actual safety measures, with over half reporting only partial or non-existent safety systems, creating a false sense of security. The study highlights vulnerabilities among contractors, with 65% lacking confidenc...

    Read More »