TelcoNews Australia - Telecommunications news for ICT decision-makers

Security breaches stories - Page 2

Ps morey haber  1

The Identity Epidemic: Why your business's digital front door is under siege

Mon, 21st Jul 2025
#
security breaches
Identities have become the prime target in cybersecurity, with businesses urged to secure digital access through ownership, least privilege, MFA, and secret management.
Large cracked smartphone digital warnings business people modern office

Mobile app breaches cost firms USD $7 million despite confidence

Wed, 16th Jul 2025
#
security breaches
Despite 93% confidence in defences, 62% of firms faced mobile app breaches costing an average of USD $6.9 million in 2025, says Guardsquare study.
Secure home network with digital lock and multiple connected devices

Five use cases that justify ditching VPNs for good

Thu, 10th Jul 2025
#
security breaches
Organisations face rising VPN breaches and slow speeds, prompting a shift to Zero Trust Network Access for safer, faster hybrid work and cloud migration.
Uk business office old computer servers desktop monitors digital security shields warnings

UK firms warned of risks in relying on outdated technology

Fri, 20th Jun 2025
#
security breaches
UK firms relying on outdated legacy systems risk security breaches, inefficiencies, and missed growth, warns Essenkay amid rising cyber threats and economic pressures.
Cloud security risks data protection singapore city skyline illustration

Tenable report warns of cloud security gaps in Singapore & SEA

Fri, 20th Jun 2025
#
security breaches
Tenable's 2025 report reveals serious cloud security gaps in Singapore and Southeast Asia, risking exposure of sensitive data and non-compliance issues for firms.
Realistic computer hardware chips digital shield cybersecurity memory safety

BT joins CHERI Alliance to drive secure hardware adoption

Thu, 19th Jun 2025
#
security breaches
BT Group has joined the CHERI Alliance to promote hardware memory safety technology, aiming to strengthen cybersecurity across digital infrastructure.
Mobile phone with protective shield symbolizing app security cyber

Digital.ai launches Quick Protect Agent for rapid app defence

Thu, 12th Jun 2025
#
security breaches
Digital.ai unveils Quick Protect Agent, enabling organisations to secure mobile apps swiftly with minimal technical skills, tackling rising AI-driven cyber threats.
Professional cybersecurity environment europe digital security interfaces human interaction vigilance

Infinigate secures Keepnet xHRM rights to counter vishing rise

Tue, 3rd Jun 2025
#
security breaches
Infinigate has partnered with Keepnet to distribute human risk management tools across Europe amid rising threats.
British small business network digital glowing lines shield protection ai brain decision maker

UK SMEs boost cyber security spend but wary over AI adoption

Fri, 30th May 2025
#
security breaches
A Bionic survey reveals 53% of UK SMEs boosted cyber security spend in 2024, yet many remain cautious about adopting AI in 2025 amid accuracy and knowledge concerns.
Techday f 83e8fd556d182137a340

Untested code leaves UK firms facing rising software outage risk

Thu, 15th May 2025
#
security breaches
Research by Tricentis reveals 66% of global firms face software outage risks, with 73% of UK businesses deploying untested code amid pressure for faster releases.
Techday f 97984946163d6c6e4003

Most organisations lack visibility into software supply chains

Thu, 15th May 2025
#
security breaches
Fewer than 40% of organisations have full visibility into their software supply chains, exposing risks amid rising cybersecurity concerns and regulation.
Techday f 617132e59d95b2fe7177

Survey shows enterprises shift towards software-driven pentesting

Thu, 8th May 2025
#
security breaches
Over 50% of enterprises now use software-driven penetration testing as their primary method to identify IT vulnerabilities, reveals Pentera survey.
Techday f da6202b2d17fcabfd270

Experts urge strong identity measures as password risks grow

Tue, 29th Apr 2025
#
security breaches
Cyber security experts warn organisations to strengthen password and identity management as breaches rise globally, highlighting risks from both human and machine identities.
Techday f a7611411c9d0efe08bff

Bugcrowd unveils red team service for cyber defence

Mon, 28th Apr 2025
#
security breaches
Bugcrowd launches Red Team as a Service, offering scalable, intelligence-led cyber attack simulations via a global network of ethical hackers.
Techday f bdd6a5b286b88b636587

Nine in ten IT leaders faced cyberattacks as threats intensify

Wed, 23rd Apr 2025
#
security breaches
A new report reveals that 90% of IT leaders faced cyberattacks in 2024, with nearly one fifth enduring over 25 breaches amid growing cloud vulnerabilities.
Techday f 7f517678547dc451be70

Organisations ramp SaaS security spend but gaps persist

Wed, 23rd Apr 2025
#
security breaches
New research reveals organisations ramp up SaaS security budgets yet face persistent risks in data protection and access control amid growing adoption.
Ps julian headshot bio bigger  1

So, what does secure file sharing actually look like?

Tue, 22nd Apr 2025
#
security breaches
High-profile breaches on apps like Signal highlight the urgent need for user-friendly, secure file sharing to protect sensitive data in government and industry.
Techday f b7e5dff122569e1ea5a6

Most firms failing audit standards due to poor workflows

Thu, 17th Apr 2025
#
security breaches
Research by Swimlane reveals only 29% of organisations consistently meet compliance standards amid rising regulations and fragmented audit workflows.
Techday f f737d9cae2867912f09a

Trend Micro explores Russian cyber underground's influence

Wed, 16th Apr 2025
#
security breaches
Trend Micro's latest report unveils the evolution of the Russian-speaking cyber underground, revealing its impact on global cybercrime amid shifting geopolitical landscapes.
Techday f 37de37dbd807dfc23b19

Google Cloud Run vulnerability exposed by Tenable Research

Fri, 4th Apr 2025
#
security breaches
Tenable Research has uncovered a vulnerability in Google Cloud Run, named ImageRunner, which could allow attackers to access private container images.