cyber risk

cyber risk news search results

Developer news items we found relating to cyber risk

20 results
FCC-prohibits-new-foreign-router-models-citing-critical-infrastructure-risks

FCC prohibits new foreign router models citing critical infrastructure risks


Thursday, April 9, 2026 by

The Federal Communications Commission has updated its Covered List to include all consumer grade routers produced in foreign countries. This action restricts approval of new device models that could enter the United States market without sufficient safeguards. The step reflects a coordinated national security determination by Executive Branch experts that certain router...


Cloudbrink-expands-secure-connectivity-platform

Cloudbrink expands secure connectivity platform


Wednesday, March 4, 2026 by

Cloudbrink announced expanded security and performance benefits for AI agents and online AI services. The new AI capabilities are available on the same platform as Cloudbrink’s award-winning secure connectivity, allowing companies to secure users, apps, and AI in a more unified way. According to a McKinsey report, 88 percent of enterprises globally are using AI...


Russian-airport-hacked-as-St.-Petersburg-website-reports-cyberattack

Russian airport hacked as St. Petersburg website reports cyberattack


Monday, October 6, 2025 by

Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...


Push-for-FTC-to-Investigate-Microsoft

Push for FTC to Investigate Microsoft


Monday, September 22, 2025 by

U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure. Senator highlights cybersecurity risks In a letter addressed to FT...


-Raidiam-research-reveals-API-security-risks

Raidiam research reveals API security risks


Thursday, August 7, 2025 by

A new report from Raidiam, a global leader in secure API access management, has uncovered an API security crisis hiding in plain sight: 84% of enterprises operating outside regulated environments have API security protections that fall dangerously short of what’s needed given the sensitivity of the data they expose. The report, Helping ...


KNP-ransomware-attack

KNP ransomware attack


Wednesday, August 6, 2025 by

One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...


McDonalds-AI-Hiring-Bot-Breach

McDonalds AI Hiring Bot Breach


Thursday, July 17, 2025 by

Security researchers uncovered a critical vulnerability in McDonald’s AI-powered hiring system, McHire, revealing how a simple password flaw could have exposed applicant data, but importantly, no candidate information was leaked or made publicly available, and only five records were briefly accessed by researchers who responsibly reported the issue. In a supers...


Cybersecurity-in-2025

Cybersecurity in 2025


Tuesday, February 4, 2025 by

Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...


Cybersecurity-supply-chain-risk-management-predictions-for-2025

Cybersecurity supply chain risk management predictions for 2025


Thursday, January 16, 2025 by

DTS CEO and President Edward Tuorinsky shares his cybersecurity prediction for shaping the 2025 business landscape. Cybersecurity in 2025 is like that party game where you whisper a phrase to the person next to you. One mistake is passed along to others, with funny outcomes. The stakes are higher, and the results are less amusing when data breaches or hacks travel al...


AI-dApp-builder-and-blockchain-land-from-Seneca

AI dApp builder and blockchain land from Seneca


Wednesday, July 19, 2023 by

Seneca announces a series of product launches: full-scale application development within a decentralized environment. The platform unveiling and token presale signify a paradigm shift in data ownership and user autonomy. As AI technology continues to evolve, the demand for personal data has grown exponentially. However, the adoption of these technologies faces challe...


AI-ML-and-IoT-trends-in-2022

AI ML and IoT trends in 2022


Thursday, January 6, 2022 by

Rob Gibbon, Product Manager at Canonical, and Gabriel Aguiar Noury, Robotics Product Manager at Canonical, the publisher of Ubuntu discuss their predictions and AI/ML & IoT trends in 2022. AI ML and IoT Prediction - Rob Gibbon: Whilst the AI/ML adoption trend accelerates, shadow IT environments and ungoverned cloud run costs will increasingly become an unaccep...


Cloud-and-cyber-asset-management-trends-for-2022

Cloud and cyber asset management trends for 2022


Thursday, January 6, 2022 by

Companies have been racing to mature their technologies and pursue digital transformations in the last few years, as a way to gain or maintain competitive advantage and resilience. This has led to an emerging area of focus: cyber asset management. Organizations are now taking inventory of their IT infrastructure and prioritizing more agile cyber asset management process...


Offshore-software-developers-risks-and-advantages

Offshore software developers risks and advantages


Thursday, October 28, 2021 by

The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market. Risks and advantages of using offshore software developers The pandemic ...


Faster-customer-integrations-from-HackerOne

Faster customer integrations from HackerOne


Thursday, July 29, 2021 by

Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...


FTC-cracks-down-on-comprehensive-data-security-for-Utah-company

FTC cracks down on comprehensive data security for Utah company


Thursday, November 14, 2019 by

A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers. InfoTrax Systems, L.C., provides back-end operation services to multi-leve...


One-click-microsegmentation-platform-from-Edgewise

One click microsegmentation platform from Edgewise


Thursday, June 20, 2019 by

Edgewise Networks launched its new platform that radically simplifies the creation and management of zero trust environments with one-click microsegmentation. In seconds, companies can stop internal network attacks that have bypassed perimeter defenses. The benefits include a significantly reduced network attack surface, operational efficiency for policy creation and ma...


Flexera-issues-warning-about-Cyberattacks

Flexera issues warning about Cyberattacks


Tuesday, October 24, 2017 by

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...


Report-Details-Cybersecurity-Implications-for-the-Energy-Sector

Report Details Cybersecurity Implications for the Energy Sector


Thursday, April 21, 2016 by

ScottMadden has released a report highlighting the future implications on cybersecurity for the energy sector. The report outlines the significant changes to the energy grid taking place in certain parts of the US which will result in significant exchanging of confidential information - information that has traditionally remained within the control of utilities. In...


New-Security-Report-Reveals-Increased-Threat-for-Mobile-Applications-

New Security Report Reveals Increased Threat for Mobile Applications


Sunday, February 21, 2016 by

According to a new cyber security report, mobile applications increasingly have become top security threats plaguing enterprises over the past year. The details are outlined in the recently published Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016.As the company points out in the report, traditional network perimeters are disappearing allowing attack surfaces to...


New-Report-Highlights-Wide-Ranging-Cybersecurity-Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges


Wednesday, September 2, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...


Featured Stories


APAC 5G expansion to fuel 347B mobile market by 2030
APAC 5G expansion to fuel 347B mobile market by 2030 Tuesday, April 21, 2026




Jentic launch gives AI agents api access
Jentic launch gives AI agents api access Wednesday, April 15, 2026


Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines
Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines Tuesday, April 14, 2026


Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance
Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance Tuesday, April 14, 2026


IT spending rises as banks balance legacy and innovation
IT spending rises as banks balance legacy and innovation Monday, April 13, 2026


FCC prohibits new foreign router models citing critical infrastructure risks
FCC prohibits new foreign router models citing critical infrastructure risks Thursday, April 9, 2026


Enviromates tech startup launches global participation platform
Enviromates tech startup launches global participation platform Friday, March 27, 2026


Private Repository Secures the AI-driven Development Boom
Private Repository Secures the AI-driven Development Boom Friday, March 27, 2026


UK Fintech Platform Enviromates Connects Projects Brands and Consumers
UK Fintech Platform Enviromates Connects Projects Brands and Consumers Thursday, March 26, 2026


How Industrial AI Is Transforming Operations in 2026
How Industrial AI Is Transforming Operations in 2026 Wednesday, March 25, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>