Recent trends in the targeting of critical public transport infrastructures prompt reviews of supply chain vulnerability profiles and EV cyber resilience. Recent investigations by a Norwegian public ...
Cybercrime is different than other forms of crime. While other criminals use force and intimidation as their primary tools, cybercriminals rely on their intelligence and ability to manipulate others.
Subcontractor account-compromise enabled illegal data extraction including names, emails, phones, and support messages; regulators notified. A French online DIY marketplace is warning that nearly 38m ...
A highly advanced Linux malware built rapidly using autonomous AI reveals how a skilled operator can generate attack campaigns super speedily. Furthermore, the development-phase malware was ...
Global insurtech bolttech’s new research examines the cyber protection gap across Asia Pacific’s emerging and developed markets. bolttech found that although most consumers expect their households to ...
Insights from a non-profit financial cybersecurity consortium highlight how APAC financial institutions can tackle diverse cyber threats and strengthen collaborative defense. Today, cybersecurity is ...
A US$11 million blockchain exploit last month has reignited questions about how secure today’s cross-chain infrastructure really is. In October 2025, the Garden bitcoin bridge suffered a roughly US$11 ...
Cybersecurity-linked satellite disruptions threaten trade, finance, and transport; resilience planning and regional cooperation will need to become essential priorities. From guiding tankers through ...
As we plunge into the still-uncertain cybersecurity world of 2026, here are some predicted trends I find interesting. Hope you do too! Predictions are only as useful as users care to prepare for them.
Federal and state actions question a bigtech firm’s revenue from fraudulent advertising, protections for minors, and end‑to‑end encryption assurances on WhatsApp. US authorities are scrutinizing Meta ...
Secure your organization’s future: prioritize trusted digital infrastructure and AI governance today
Fragmented systems and AI risks are creating unpredictable security and privacy challenges that are wrecking digital trust. Can this be fixed? For better or worse, the narrative around the Asia ...
Despite recent safeguards against AI video tool abuse, users have succeeded in generating realistic fake footage flooding every social media space. According to a recent NY Times report, OpenAI’s Sora ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results