APIs become the leading attack vector, cybersecurity research shows
Cybersecurity firm Imperva has found that 71% of last year's web traffic was linked to APIs, acting as a major attack vector due to organisations' insufficient visibility, leading to a sharp rise in targeted attacks.
Trend Micro dismantles major ransomware group LockBit
Trend Micro collaborates with global law enforcement agents to disrupt major ransomware group, LockBit, responsible for a quarter of 2023's ransomware leaks amounting to billions of dollars.
Take a closer look at your company's software supply chain
Amid the rise of remote work and cloud technology, firms face increased cyber security risks from poorly managed software supply chains, warns industry expert.
New Barracuda threat report reveals web apps exploitation methods
The Threat Spotlight report by Barracuda Networks reveals a surge in cyberattacks exploiting web application security gaps, with over 18 billion attacks mitigated in 2023.
Armis acquires CTCI, forms AI-powered cybersecurity powerhouse
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Retail theft at self-checkouts doubles, AI poses possible solution
Surging retail theft via self-checkouts sees cart-based losses doubling in a year, costing the average store over $102k annually, reveals an Everseen report.
Guardio Labs exposes critical vulnerability in Opera browser
Guardio Labs uncovers a significant zero-day vulnerability in Opera's browser, threatening its 350 million active users; Opera's 'My-Flow' feature enables act of exploitation.
Google Cloud launches tool to detect plaintext credentials for free
Google Cloud launches a secret discovery tool aimed at boosting organisation's security by detecting and monitoring plaintext credentials, part of its no-cost Sensitive Data Protection offering.
iPhone hardware feature exploited in Operation Triangulation
Kaspersky reveals hackers have utilised a previously unknown iPhone hardware feature to bypass Apple's memory protections.
Netsafe reveals growing online harm for New Zealanders
Netsafe's 2023 research reveals a sharp rise in harmful digital communications experienced by New Zealanders, with almost half of the Māori population and many under 30 falling victim.
NEC unveils AI strategy, aims to revolutionise industries with generative AI
NEC launches a tailored AI solution to revolutionise operations across industries, building on its enhanced large language model.
CybeReady celebrates standout year in security awareness training
CybeReady has seen exceptional growth over the course of 2023, with significant strides in security awareness training solutions.
Zoom introduces VISS, an innovative approach to vulnerability assessment
Zoom unveils Vulnerability Impact Scoring System (VISS), an open-source method set to revolutionise online security. .
Check Point: Protecting ICS from cyber threats
Check Point Software introduces new security gateway for Industrial Control Systems; aims to prevent cyber attacks on critical infrastructure.
UPDATE: Stalled EQC policy review leaves global reinsurers uncertain over NZ market
The government review of the Earthquake Commission's funding and policy structures is leaving global reinsurers uncertain as they try to assess the.
High Court makes declarations on EQC flooding risk policy
The High Court in Wellington has made a number of declarations outlining how the Earthquake Commission can deal with claims stemming from loss of l.
99% of Android mobile phones susceptible to newly found takeover attack
Recent vulnerability means that 99% of all android phones could be exploited to the point where they could be completely overidden.
Internet security: You’re still the weakest link
Bad news for careless internet users: all the software in the world probably can’t protect you if you don’t use your head.
Microsoft to drop 'Autorun'
Software giant aims to reduce the number of ways in which malware can infect PCs by turning off the Autorun and Autoplay functions.
The perils of VoIP
You may be confident that your computer system is secure from intruders, but have you ever thought about your phones?.
Wired for unified comms
Unifi ed communications requires a well-planned network platform to be successful.
Facebook bug exposes private chats
The latest in a long line of privacy issues has hit Facebook users.
New IE exploit detected
Microsoft is hurrying to deal with a new vulnerability<br />detected in the Internet Explorer browser that could allow a hacker to take<br />control of a computer.
Google attack an inside job?
Google is investigating reports that someone at its China headquarters may have – willingly or unwittingly – assisted in what is believed to have been infiltration of its networks by Chinese officials.