TelcoNews UK - Telecommunications news for ICT decision-makers

Supply Chain Security stories - Page 7

Madhu

Leading security in the AI era: Why CISOs must secure AI while using AI to secure the enterprise

Last month
#
data protection
#
devops
#
digital transformation
CISOs now face a dual AI mandate: securing fast‑growing AI systems while deploying AI to transform and harden enterprise defences.
Embedded circuit board to document stack symbolizing software bom

Manifest tool boosts SBOMs for critical C & C++ code

Last month
#
application security
#
cartech
#
devsecops
Manifest unveils SBOM generator for unmanaged C and C++ code, tackling critical supply chain blind spots in embedded and safety systems.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
David byrnes

Kiteworks & Kasm unite to secure sensitive data flows

Last month
#
virtualisation
#
data protection
#
endpoint protection
Kiteworks and Kasm link governed data exchange with isolated workspaces to tighten control of sensitive information across partners.
It security ops room ai agents locks shields cloud network

SurePath AI unveils real-time controls to secure MCP use

Last month
#
firewalls
#
endpoint protection
#
document management
SurePath AI launches real-time MCP policy controls to lock down AI tool access, aiming to secure fast-growing workplace agent workflows.
Moody uk shop night ai scams ghostly screens distorted faces

AI scams 2.0 leave UK small businesses more exposed

Last month
#
malware
#
data protection
#
digital transformation
AI-powered deepfakes and targeted malware ads are fuelling a new wave of scams, leaving UK small firms dangerously exposed online.
Abby kearns

ActiveState names Abby Kearns as new Chief Executive

Last month
#
digital transformation
#
application security
#
it automation
ActiveState appoints seasoned open source leader Abby Kearns as Chief Executive, sharpening its focus on managed open source security.
Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

Last month
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.
Msp soc analysts monitors chain icons third party risk scene

Cynomi targets MSPs with new third-party risk push

Last month
#
saas
#
digital transformation
#
cloud security
Cynomi is urging MSPs to tap booming demand for third-party risk services as supply chain attacks surge and compliance rules tighten.
Moody night coding workstation puzzle piece supply chain risks

Open source dependencies leave apps dangerously exposed

Last month
#
uc
#
digital transformation
#
application security
Secure.com warns most apps hide critical flaws in open source components, as unpatched dependencies and licence risks leave firms exposed.
Nato cyber ops center world map threat dashboards natl security

EclecticIQ unveils doctrine-led cyber intel platform

Last month
#
advanced persistent threat protection
#
socs
#
supply chain
EclecticIQ launches Defence TIP, a doctrine-aligned cyber intel platform tailored for NATO, US military and coalition defense workflows.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Remote worker london facial recognition shield against deepfakes

iProov unveils biometric suite to combat deepfake fraud

Last month
#
surveillance
#
pam
#
mfa
iProov launches a biometric Workforce Solution Suite to verify real human presence and shield employers from deepfake-driven identity fraud.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last month
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Software engineer ai coding security shields padlock network diagram

Endor Labs launches AURI to secure AI-driven coding

Last month
#
digital transformation
#
application security
#
devsecops
Endor Labs unveils AURI, a security intelligence platform embedding reachability-led checks into AI coding assistants and CI/CD pipelines.
Software engineer phone screen glowing shield mobile app security

Digital.ai unveils AI tool to harden mobile app builds

Last month
#
endpoint protection
#
devops
#
application security
Digital.ai launches Quick Protect AI to harden Android and iOS apps post-build, embedding automated security into CI/CD pipelines.
Modern datacenter cloud with ai security testing shield lock

Terra Security gains first AWS nod for AI threat tests

Last month
#
network infrastructure
#
devops
#
hyperscale
Terra Security becomes first AWS partner validated for Autonomous Security Validation, as AI-driven continuous threat testing gains pace.
Dev team monitoring code pipelines with app security scanning

Archipelo, Checkmarx tie dev context to app security

Last month
#
devops
#
application security
#
devsecops
Archipelo and Checkmarx partner to fuse dev workflow signals with app security scans, giving teams origin evidence to prioritise fixes.
Moody engineer cicd pipelines morphing into shadowy hands vaults

JFrog flags 13 critical CI/CD flaws in GitHub workflows

Last month
#
siem
#
fintech
#
application security
JFrog warns 13 GitHub CI/CD workflow flaws, mostly critical, could let attackers hijack pipelines and steal secrets at scale.
Asian engineer cybersecurity breach red warnings cloud repos

Claude Code flaws expose new risks in AI dev tools

Last month
#
devops
#
cloud security
#
application security
Claude Code flaws found by Check Point could let malicious repos run code and grab API keys before developers confirm a project is trusted.