COMMENTARYOrganizations are facing a challenging cybersecurity environment and a chaotic threat landscape. With an increasingly broad range of sophisticated, easy-to-use tools in the hands...
The authentication mechanism within the Google Kubernetes Engine (GKE) has a loophole that could allow an external attacker with any Google account to access...
Business Security Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective...
From January 31, OCBC Singapore is set to expand its OCBC Money Lock ‘kill switch’ service to time deposits. This follows its successful implementation...
In 2023, web3 apps soared 124%, with blockchain gaming leading the way at 34% dominance. Non-fungible tokens (NFTs) and decentralized finance (DeFi) also surged,...
Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari.The bug, assigned as CVE-2024-23222, stems from a type confusion...
Privacy, when done correctly, is the natural evolution of the industry's commitment to individual freedom, data security, and transparency.The crypto industry stands at a...
Social gaming platform Gamee’s token suffered an exploit late Monday evening, with the alleged perpetrator taking 600 million GMEE tokens that were subsequently liquidated...
Threat actors have unleashed a fresh wave of cyberattacks targeting a critical remote code-execution (RCE) vulnerability in Apache ActiveMQ, for which the Apache Software...