First use of regime against a cyber actor. Source
Exploited Webkit vulnerability in MacOS, iOS and iPadOS. Source
Sentenced to 150 hours of community work. Source
Three new cables, plus an extra PoP in Texas. Source
Sees its deterrence activities potentially taking a hit. Source
Attack via malicious file uploads. Source
New facility to cater for AI workloads. Source
Most organisations have value and profits locked inside inefficient processes. Source
Makes microservices more consistent and more easily changed. Source
Looks to develop "decision support" tools. Source
Stole some emails and documents. Source
By 2027. Source
Hopes to set up a network of facilities. Source
Impacted individuals allege “fishing expedition” for excessive information. Source
Backtracks on threat to seek shutdown of noncompliant apps. Source
As part of suite of cyber security-related upgrades. Source
With mobile services yet to be re-awarded. Source
Giving comparison sites more prominence. Source
Turning early demos into money-makers. Source
After finding itself excluded during a recent response. Source