News

Ukraine reportedly used a nearly 20-year-old open-source ArduPilot software in its Operation Spider Web to destroy over a ...
Basing themselves on figures from the Federation of Small Businesses, the CyCOS researchers say that 5.5 million SMEs ...
Advanced threats, including ransomware, supply chain breaches and nation-state attacks, exploit the fact that the current ...
A key prerequisite for commencing the Minibus service field trial was providing clear evidence that the autonomous mobility project complies with the UN-R155 regulation and ISO/SAE 21434 standard.
The Raspberry Pi is a credit card-sized computer capable of running full-fledged Linux distributions such as Raspberry Pi OS, ...
Following these best practices can help organizations improve their defenses while ensuring a more consistent and transparent ...
CSIRO is uplifting cyber security across its enterprise and research functions with an emphasis on protecting core systems, tightening access controls and improving incident response. Speaking to ...
Cyber attacks on businesses continue to escalate in 2025, with global organisations experiencing an average of 1,925 ...
The Play ransomware group has hit about 900 organizations globally so far and uses “double extortion” after data theft.
Just as AI introduces new threats and vulnerabilities, it also offers transformative potential in cybersecurity applications.
The report also found that 42% of data breaches were discovered by security teams, a 9% improvement from last year. This increase is attributed to greater investment in cyber planning and threat ...
Abu Dhabi: The UAE Cyber Security Council has issued an urgent advisory following Microsoft's release of critical security updates that address multiple vulnerabilities, including several zero-day ...