SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Supply Chain Security stories - Page 3

Flux result 4b7be8d2 61e2 4407 af1c 1088978c23b7

North Korean operatives target Australian jobs, DTEX warns

Last month
#
hcm
#
advanced persistent threat protection
#
physical security
DTEX warns North Korean operatives are using false identities to secure Australian tech jobs, with some applicants aided by AI and deepfakes.
Flux result 2dd6e765 d72a 468e ae19 7b5d4c3c4c21

Codenotary launches AgentMon for AI agent oversight

Last month
#
data protection
#
digital transformation
#
application security
Codenotary unveils AgentMon to help Chief Information Officers and security teams track AI agent behaviour, costs and policy risks.
Flux result b5f37711 6539 406f 9877 407f52f3e65f

Codenotary launches AgentX for Linux security automation

Last month
#
virtualisation
#
devops
#
hybrid cloud
Codenotary unveils AgentX to automate Linux security operations across hybrid cloud and on-premises systems while keeping administrators in control.
Flux result ff85c0f6 aa13 4ff7 ae42 c0b79c19e791

Percona & Chainguard launch supported database images

Last month
#
virtualisation
#
devops
#
digital transformation
Percona teams up with Chainguard to offer supported, hardened container images for MySQL, PostgreSQL and MongoDB databases.
Email attachment20260327 3694396 a95v2y

Manufacturers face CMMC readiness gap in defence chain

Last month
#
ransomware
#
iot security
#
supply chain
Small US defence manufacturers face CMMC readiness shortfalls as cybersecurity checks tighten, with many underestimating the work needed to win contracts.
Flux result c9914888 9e4c 4a56 a107 b3dc6dd433be

DigiCert posts record ARR after Valimail acquisition

Last month
#
saas
#
firewalls
#
digital transformation
DigiCert scales digital trust platform with Valimail deal as Q4 annual recurring revenue hits a company record and bookings top guidance.
Flux result 86c5d3ff 8544 4b88 ac41 93781b8158bc

AppOmni adds Heisenberg mode after LiteLLM supply attack

Last month
#
virtualisation
#
cloud security
#
application security
AppOmni upgrades Heisenberg to help teams trace GitHub Actions and spot tainted dependencies after the LiteLLM supply chain breach.
Flux result 02787d00 65b3 4fa4 8006 314fc884629f

HPE boosts AI security across networking & recovery

Last month
#
virtualisation
#
firewalls
#
data protection
HPE rolls out AI governance, recovery and post-quantum updates across networking and storage to strengthen cyber resilience in distributed operations.
Flux result 89c892f4 bb6f 446d ab90 b15476e99e4f

Phishing surge targets Gulf after Iran-Israel tensions

Last month
#
malware
#
firewalls
#
network security
Bitdefender reports a 130% jump in phishing and malware activity across Gulf markets, with fake invoices and banking lures driving attacks.
Email attachment20260326 1927777 rp0pkf

Auror named LPRC's most engaged partner on retail crime

Last month
#
data analytics
#
supply chain
#
risk & compliance
Auror recognised by Loss Prevention Research Council for engaging retailers and police on organised retail crime in the US.
Flux result 110baaa4 c6d3 4b1c a508 287d019f2a12

Vorlon launches tools for AI agent security response

Last month
#
data protection
#
cloud security
#
socs
Vorlon unveils AI Agent Flight Recorder and Action Centre to help security teams trace activity across SaaS apps and coordinate responses.
Security experts ops room governance autonomous ai agents cloud shield

Cloud Security Alliance launches CSAI for agentic AI

Last month
#
cloud security
#
iam
#
supply chain
Cloud Security Alliance unveils CSAI foundation to set rules, standards and assurance for securing autonomous agentic AI systems.
Flux result 0b725e6f 488f 44c4 b57e 5c23a2bc516f

NetRise launches Provenance to trace open source risk

Last month
#
devops
#
iot security
#
iot
NetRise unveils Provenance, a tool to trace open source maintainers and stop risky dependencies before they spread through software.
Cybersecurity analyst ai red teaming prompt injection shield branching

Novee launches AI red teaming tool for LLM app risks

Last month
#
devops
#
cloud security
#
application security
Novee unveils an autonomous AI red teaming tool to probe LLM apps for prompt injection, jailbreaks and other emerging security flaws.
Corporate security vendor risk ai compliance dashboard team review

Drata launches AI tools for risk reviews & trust centres

Last month
#
cloud security
#
rpa
#
supply chain
Drata rolls out agentic AI tools to speed third-party risk reviews, automate security questionnaires and rapidly build online trust centres.
Software engineer reviewing branching dependency tree upgrade success green

Sonatype finds live data beats larger AI models on upgrades

Last month
#
devops
#
application security
#
supply chain
Sonatype says smaller AI tied to live software data can outsecure larger models on dependency upgrades, slashing risk and cost.
Editorial storm cloud over server racks cracked padlocks data risk

Red Hat survey finds cloud security incidents rife

Last month
#
data protection
#
digital transformation
#
cloud security
Red Hat survey finds 97% of organisations hit by cloud-native security incidents, forcing delays, higher costs and loss of customer trust.
Clean isometric data center control room ai workflow ux vm container clusters

SUSE adds AI & virtualisation tools to Rancher Prime

Last month
#
virtualisation
#
devops
#
hyperscale
SUSE expands Rancher Prime with AI agents and deeper virtualisation, unifying VM and container management to streamline modern workloads.
Disassembled industrial cellular iot device usb analyzer tech probing

Rapid7 warns of cellular IoT hardware attack risks

Last month
#
uc
#
firewalls
#
devops
Rapid7 warns that hands-on attacks against cellular IoT hardware can pivot through trusted modules to breach cloud and backend systems.
Andre durand

Ping launches Identity for AI with runtime controls

Last month
#
data protection
#
digital transformation
#
cloud security
Ping unveils Identity for AI, a runtime identity framework to govern autonomous software agents' access, actions and accountability.