TelcoNews UK - Telecommunications news for ICT decision-makers

Supply Chain Security stories - Page 3

Flux result d25c2701 0034 45e9 883a 9aeb9fa61d60

Booking.com warns some customers of possible data exposure

This month
#
data protection
#
endpoint protection
#
mfa
Booking.com tells some customers to watch for phishing after suspicious activity exposed reservation details, contact data and messages linked to bookings.
Flux result f3a23773 f3c5 4ab1 8315 098438942b1a

AI agents expose major API security gap, Salt warns

This month
#
manufacturing
#
digital transformation
#
cloud security
Salt warns AI agents are widening the API security gap, with 92% of organisations still short of advanced defences and 47% delaying releases.
Flux result a551e609 c277 41e0 a40d 9441732a3040

Cloudsmith survey finds SBOM gaps before cyber law

This month
#
devops
#
cloud security
#
application security
Cloudsmith survey finds most engineering teams still lack automated SBOM checks, leaving many unready for fast EU Cyber Resilience Act audits.
Flux result 2dc55ca1 35de 468c b46e 1d9fd52fe6d7

Yokogawa lands cyber certification for plant control systems

This month
#
manufacturing
#
iot security
#
supply chain
Yokogawa wins three cybersecurity approvals for control, safety and connectivity products as plant operators face tighter scrutiny over cyber risk.
Flux result 241e3ccd 7dcb 4941 95cc 1a5ef9df5d45

Intruder adds container image scanning to cloud platform

This month
#
virtualisation
#
devops
#
hybrid cloud
Intruder expands cloud security platform with registry-level container image scanning for AWS, Google Cloud and Azure users.
Flux result 5b263814 3fad 44ef 9433 96aeced156c1

Anthropic launches Project Glasswing for cyber defence

This month
#
firewalls
#
hyperscale
#
network security
Anthropic enlists Amazon, Apple and Microsoft in Project Glasswing to use Claude Mythos Preview for hunting vulnerabilities in critical software.
Flux result 6e43f861 242a 4606 a620 43480305c4e9

Orca Security flags AI secrets & supply chain gaps

This month
#
malware
#
devops
#
mfa
Orca Security warns that AI credentials, vulnerable dependencies and lax pipeline controls are leaving production environments exposed across US and Europe.
Flux result 4efc9e48 c2a0 4512 b608 693628c8d2d4

Distology signs Snyk distribution deal across Europe

This month
#
devops
#
digital transformation
#
cloud security
Distology adds Snyk's AI and agent security tools to its portfolio, as the distributor broadens support for resellers across Northern Europe.
Email attachment20260409 980833 ho90zp

2N urges tougher cyber rules for access control devices

This month
#
edutech
#
data protection
#
hyperscale
2N calls for tougher cyber rules on access control, urging stronger vulnerability reporting, tighter component sourcing and longer support lifecycles.
Flux result 61d33e88 d8de 4343 9f2e 7d62c316216e

Identity compromise emerges as top cyberattack route

This month
#
digital transformation
#
pam
#
mfa
Identity failures are now the main way cyber attackers breach firms, with experts warning that non-human credentials are widening the risk.
Flux result 5e5adb51 c7dd 4117 b0f7 5aff6540c83a

Anthropic launches Glasswing AI cyber coalition with partners

This month
#
firewalls
#
hyperscale
#
cloud security
Anthropic and partners unveil Project Glasswing, using Claude Mythos Preview to hunt software flaws faster amid fears of AI-boosted cyber attacks.
Flux result 9a5fbf33 4cd5 4f62 a705 c822376a1b61

Claude Code flaw leaves deny rules vulnerable in long workflows

This month
#
cloud security
#
application security
#
socs
Anthropic’s Claude Code is under scrutiny after researchers found deny rules can weaken in long workflows, raising fresh concerns for AI-driven development.
Flux result 164734b3 df8a 49a5 ba15 4dacf4dca1c7

PyTorch Foundation adds Safetensors for safer AI models

This month
#
application security
#
devsecops
#
supply chain
PyTorch Foundation adds Hugging Face's Safetensors to hosted projects as open source AI groups push safer model distribution and loading.
Flux result 43ed0830 7093 4b90 86c2 cece3ec9c9e5

Anthropic launches Project Glasswing for cyber defence

This month
#
firewalls
#
hyperscale
#
network security
Anthropic expands a guarded AI pilot with Amazon, Apple, Microsoft and others, offering Claude Mythos Preview to hunt flaws in critical code and open source.
Flux result 8ebd1272 347f 4407 acbc d4999522fad4

Permiso launches sandbox for AI agent skill security

This month
#
firewalls
#
network security
#
cloud security
Permiso launches SandyClaw sandbox to detonate AI agent skills and expose hidden runtime risks before they reach enterprise systems.
Flux result 69099f59 61f8 4957 93e2 ee71c12bf092

TCCA urges standards push on critical broadband security

This month
#
uc
#
firewalls
#
network security
TCCA urges industry to align on international standards as 4G and 5G broadband systems expand the cyber risk for mission critical communications.
Flux result 95f4f393 11b7 403c 9248 57cf9e20dea5

GigaOm names Check Point leader in app & API security

This month
#
firewalls
#
devops
#
hybrid cloud
GigaOm names Check Point a third-year application security leader as its WAF posts strong detection rates and low false positives.
Flux result feea1db1 e988 45e3 b328 50fca0657709

NCC Group warns DC power regulation is a cyber risk

This month
#
hyperscale
#
iot security
#
dc
NCC Group says DC power regulation now sits in the cyber-physical attack surface, warning that firmware flaws and supply chains could let hackers disrupt critical systems.
Flux result 2134aca4 e1cc 446a 8945 80553175f1f3

Malware surge in open source software alarms firms

This month
#
malware
#
devops
#
application security
Open source malware advisories jumped in 2025 as Endor Labs warned that firms are under-prepared and budgets lag the threat.
Flux result ab916ad7 2d8e 4673 98e2 bc7cf7baf986

Forrester warns Middle East conflict will squeeze IT budgets

This month
#
digital transformation
#
hyperscale
#
public cloud
Forrester says Middle East tensions will push up infrastructure costs, sharpen cloud and AI spending scrutiny, and heighten cyber risk.