Latest Cybersecurity News
View all →Telstra finalises moves off Siebel, Teradata, Pivotal Cloud Foundry
Telstra has reached a significant milestone in its multi-year IT estate transformation and simplification, exiting its 20-year-old Siebel CRM, alongside Teradata, Veritas and Pivotal Cloud…
Cybersecurity M&A Roundup: 33 Deals Announced in April 2026
Thirty-three cybersecurity-related merger and acquisition (M&A) deals were announced in April 2026. For a detailed view of the more than 420 acquisitions announced in 2025,…
U.S. CISA adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalog
U.S. CISA adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalog Pierluigi Paganini May 04, 2026 The U.S. Cybersecurity and Infrastructure Security…
Crowdsource Awards 2025: Celebrating our community of elite ethical hackers
The foundation of modern security is understanding that securing your growing, complex attack surface cannot be achieved with static tools; it demands a global, outside-in…
Introducing Wallarm Middle East Cloud: Built for Data Residency Compliance — API Security
As API and AI adoption grows across the Middle East, so do the expectations around how data is handled. For many organizations operating in this…
Why data centers now belong on the critical infrastructure list
Missile and drone attacks that took out cloud data centers in the Middle East underscored a critical vulnerability in the modern economy: reliance on digital…
Security agencies draw red lines around agentic AI deployments
CISA and its international partners also recommended integrating human control and oversight into agentic AI workflows to ensure they are approved for non-sensitive, low-risk tasks.…
MITRE ATT&CK v19 brings structural overhaul, industrial visibility, detection strategies as AI-driven attacks emerge
Not-for-profit organization MITRE released ATT&CK v19, introducing a series of structural and intelligence updates across the framework. The long-anticipated Defense Evasion split is now implemented,…
Shadow-Earth-053 targets Asian government, defense, critical infrastructure via Exchange and IIS vulnerabilities
Researchers from Trend Micro uncovered an ongoing cyberespionage campaign, tracked as Shadow-Earth-053, attributed to a China-aligned threat cluster targeting government, defense, and critical infrastructure organizations…