Hikvision has announced that it has been awarded the EcoVadis Silver Medal, a recognition from a sustainability rating platform. The company notes that this award highlights its commitment to responsible
Monthly Archives: February 2025
Australian Critical Infrastructure Faces ‘Acute’ Foreign Threats
The continent faces “relentless” military espionage, and increased cyber sabotage at the hands of authoritarian regimes, according to a high-ranking intelligence director.
Insight Partners, VC Giant, Falls to Social Engineering
The startup incubator and PR firm with holdings in more than 70 cybersecurity firms has announced a data breach with as-yet-unknown effects.
Russian Groups Target Signal Messenger in Spy Campaign
These sorts of attacks reveal growing adversary interest in secure messaging apps used by high-value targets for communication, Google says.
Telaeris solutions receive RCM certification in Australia
Telaeris’ XPressEntry XPID200 series handheld badge and biometric readers have received RCM (Regulatory Compliance Mark) certification for Australia. According to the company, this certification ensures that XPressEntry meets the Australian Communications and
Gallagher Security unveils underrepresented voices in 2025 trends report
Gallagher Security’s latest 2025 Trends Report draws attention to the critical need to explore how human behaviour impacts security solutions. The 2025 report underscores a significant oversight in security research:
NHS hospital in England updates security system with i-PRO cameras
i-PRO has announced that a teaching hospital in Northeast England has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). The hospital, known
North Korea’s Kimsuky Taps Trusted Platforms to Attack South Korea
The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.
Xerox Printer Vulnerabilities Enable Credential Capture
Attackers are using patched bugs to potentially gain unfettered access to an organization’s Windows environment under certain conditions.
China-Linked Threat Group Targets Japanese Orgs’ Servers
Winnti once used a variety of malware but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access.