Friday, July 11, 2025

Technology

Supply chain issues pose major risks to financial organizations

While banks and financial institutions generally have strong defenses, third-party vendors often lack the same levels of security, something that can offer providing attackers indirect access to the institutions...

Philips launches a 4K gaming monitor built for speed and clarity

Philips has launched a gaming-focused monitor that promises to blend high-speed performance with high-resolution visuals. The Evnia 27M2N3800A features a unique Dual Mode setting that...

This ergonomic AI mechanical keyboard is built for modern productivity

Adesso has launched a mechanical keyboard that combines ergonomic comfort with direct AI access via a built-in hotkey that allows users to access tools...

Over half of employees fall for mobile phishing scams

A new report shows that security leaders have false confidence in their capabilities and employees when it comes to mobile security. While 96 percent...

Apple may use iPhone Presto method to wirelessly update Macs before sale

It is a frustrating position to find yourself in – bringing home or taking delivery of a newly purchased computer only to find that...

Half of Americans think AI is a threat, the other half don’t. Who’s right?

As artificial intelligence moves from tech circles into daily life, Americans are sharply divided over what it means for the future. A new Gallup survey...

Earth intelligence is becoming a $20B industry — what is it, and why should you care?

By 2030, companies will be spending more on Earth intelligence than governments and military bodies combined, according to new research from Gartner. The firm...

Ransomware is evolving faster than it’s being stopped

The number of active ransomware groups has jumped 45 percent in the past year, according to a new report from GuidePoint Security’s GRIT team. Covering...

European manufacturers face critical vulnerabilities

The manufacturing industry is the most targeted industry for cyberattacks and this has has now been the case for four consecutive years. A new study...

Persistent security gaps found in hybrid identity systems

Organizations are continuing to struggle to identify and address security vulnerabilities in hybrid identity systems such as Active Directory, Entra ID, and Okta. This is...

OT security becomes a board priority for enterprises

Operational technology (OT) can often be a cybersecurity weak spot for enterprises, relying as it does on older hardware and operating systems that are...