Spies Eye AUKUS Nuclear Submarine Secrets

Spies Eye AUKUS Nuclear Submarine Secrets

Several countries are “relentlessly” seeking information about Australia’s military capabilities, including the country’s submarine partnership with the UK and the US, warned Mike Burgess, Director-General of the Australian Security Intelligence Organisation (ASIO). The country’s head spy gave his Annual Threat Assessment for 2025 on February 19. He highlighted that espionage and foreign interference are already at extreme levels in the country and anticipates they will only intensify. “In a more complicated, competitive world, nation states…

Read More

EuroStack: Europe’s path to digital independence?

EuroStack: Europe’s path to digital independence?

Resources: critical materials, energy and skilled labor; Chips: processors, memory technologies and quantum communication systems; Networks: Digital and physical connections, including cell towers and fiber optic networks; Connected devices and IoT: devices that enable real-time information processing and data collection Cloud infrastructure: Secure data storage and computing power; Software platforms, applications and algorithms: Operating systems, applications and cybersecurity frameworks; Data and AI: processing data to gain insights. EuroStack has already identified the leading European companies…

Read More

Más allá del ‘hype’: cuatro casos de uso de IA generativa que sí han funcionado

Más allá del ‘hype’: cuatro casos de uso de IA generativa que sí han funcionado

Además, algunas de las herramientas más potentes, como el asistente de investigación que escucha activamente las llamadas y proporciona información y conocimientos en tiempo real, actualmente solo están disponibles para los agentes, no directamente para los clientes. “El asistente de investigación personal es solo para los empleados de Verizon”, dice Higgins. “Todavía nos estamos tomando el tiempo, y consultándolo todo a través de nuestro consejo de IA, antes de empezar a expandirlo también a nuestra…

Read More

Cyber Investor Insight Partners Suffers Security Breach

Cyber Investor Insight Partners Suffers Security Breach

New York-based venture capital firm Insight Partners has confirmed it was hit by a cyber-attack in January 2025. In a public statement published on February 18, the investment company said an unauthorized third party accessed some parts of its information systems through a “sophisticated social engineering attack”. The intrusion was detected on January 16. “As soon as this incident was detected, we moved quickly to contain, remediate, and start an investigation within a matter of…

Read More

Russian State Hackers Target Signal to Spy on Ukrainians

Russian State Hackers Target Signal to Spy on Ukrainians

Russian state-aligned threat actors are ramping up efforts to spy on Ukrainian military and government officials via their secure messaging applications, including Signal Messenger and WhatsApp, Google revealed today. One of the main ways these groups are targeting Signal Messenger is to abuse the “linked devices” feature which enables the app to be used on multiple devices at the same time. “Because linking an additional device typically requires scanning a QR code, threat actors have…

Read More

La estabilidad salarial marca el compás del sector tecnológico español

La estabilidad salarial marca el compás del sector tecnológico español

Tras alcanzar cierta estabilidad en 2023, el sector tecnológico continuó afianzándose el pasado 2024. Y es que tras algunos años de incrementos salariales superiores al 10%, los últimos doce meses las nóminas se mantuvieron constantes. De hecho, incluso se observó un descenso en la rotación de algunas posiciones más junior, como resultado de un mayor equilibrio entre la oferta y la demanda en dichos roles. Así se desprende del Estudio de Remuneración 2025 en el…

Read More

Ocho razones por la que sus costes en la nube son demasiado elevados

Ocho razones por la que sus costes en la nube son demasiado elevados

“Las empresas suelen adquirir recursos en la nube, como instancias de computación, almacenamiento o capacidad de bases de datos, que no se utilizan en su totalidad y, por lo tanto, pagan por más servicios de los que realmente necesitan, lo que conduce a una infrautilización”, afirma. Muchas empresas también sobreestiman los recursos necesarios, lo que lleva a aprovisionar instancias más grandes y caras de lo necesario, provocando un sobreaprovisionamiento. Kulkarni cree que la gestión ineficiente…

Read More

Hundreds of US Military and Defense Credentials Stolen

Hundreds of US Military and Defense Credentials Stolen

Some of the most sensitive corporate and military networks in the US could be at risk of compromise, after researchers revealed widespread credential theft via infostealer malware. Hudson Rock said its analysis of cybercrime marketplaces revealed compromised credentials for sale from Lockheed Martin, Boeing and Honeywell, as well as the US army and navy, the FBI and the Government Accountability Office (GAO). For as little as $10 per log, threat actors can effectively purchase access to…

Read More

CIS Control 01: Inventory and Control of Enterprise Assets

CIS Control 01: Inventory and Control of Enterprise Assets

Since 2008, the CIS Controls have been through many iterations of refinement and improvement leading up to what we are presented with today in CIS Controls version 8.1. CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, and individuals). The controls reflect consideration by people in many different roles, such as threat analysts, incident responders, solution providers, policy-makers, and more. This work is the collected wisdom from across…

Read More

Malaysia's Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration

Malaysia's Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration

In December 2024, Malaysia passed its Data Sharing Bill 2024, a new piece of legislation aimed at streamlining data-sharing across federal government agencies. This bill promises to revolutionize how data is managed, shared, and secured within Malaysia’s government, fueling a more efficient, innovative, and secure public sector. By enabling seamless data exchange between federal entities while prioritizing privacy and security, the bill is a vital step toward turning Malaysia’s vision of a modern, data-driven governance…

Read More
1 29 30 31 32 33 2,645