SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Supply Chain Security stories - Page 6

Abby kearns

ActiveState names Abby Kearns as new Chief Executive

Last month
#
digital transformation
#
application security
#
it automation
ActiveState appoints seasoned open source leader Abby Kearns as Chief Executive, sharpening its focus on managed open source security.
Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

Last month
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.
Apac govt data center cloud security vault it engineer guard

ControlPlane unveils enterprise support for OpenBao

Last month
#
encryption
#
pam
#
cloud security
ControlPlane launches enterprise support for OpenBao as IBM's USD $6.4 billion HashiCorp deal drives demand for open source Vault alternatives.
Msp soc analysts monitors chain icons third party risk scene

Cynomi targets MSPs with new third-party risk push

Last month
#
saas
#
digital transformation
#
cloud security
Cynomi is urging MSPs to tap booming demand for third-party risk services as supply chain attacks surge and compliance rules tighten.
Moody night coding workstation puzzle piece supply chain risks

Open source dependencies leave apps dangerously exposed

Last month
#
uc
#
digital transformation
#
application security
Secure.com warns most apps hide critical flaws in open source components, as unpatched dependencies and licence risks leave firms exposed.
Nato cyber ops center world map threat dashboards natl security

EclecticIQ unveils doctrine-led cyber intel platform

Last month
#
advanced persistent threat protection
#
socs
#
supply chain
EclecticIQ launches Defence TIP, a doctrine-aligned cyber intel platform tailored for NATO, US military and coalition defense workflows.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Saviynt

Saviynt picks NEXTGEN to drive APAC identity growth

Last month
#
pam
#
cloud security
#
socs
Saviynt taps distributor NEXTGEN to expand APAC and Japan identity security reach as non-human accounts surge and AI risks intensify.
Headshot nigel hardy

Making cyber threat intelligence work: closing the intelligence paradox

Last month
#
digital transformation
#
cloud security
#
iot security
Businesses must turn generic cyber threat data into tailored, actionable intelligence or risk paying more for security that feels no safer.
Remote worker london facial recognition shield against deepfakes

iProov unveils biometric suite to combat deepfake fraud

Last month
#
surveillance
#
pam
#
mfa
iProov launches a biometric Workforce Solution Suite to verify real human presence and shield employers from deepfake-driven identity fraud.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last month
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Software engineer phone screen glowing shield mobile app security

Digital.ai unveils AI tool to harden mobile app builds

Last month
#
endpoint protection
#
devops
#
application security
Digital.ai launches Quick Protect AI to harden Android and iOS apps post-build, embedding automated security into CI/CD pipelines.
Software engineer ai coding security shields padlock network diagram

Endor Labs launches AURI to secure AI-driven coding

Last month
#
digital transformation
#
application security
#
devsecops
Endor Labs unveils AURI, a security intelligence platform embedding reachability-led checks into AI coding assistants and CI/CD pipelines.
Modern datacenter cloud with ai security testing shield lock

Terra Security gains first AWS nod for AI threat tests

Last month
#
network infrastructure
#
devops
#
hyperscale
Terra Security becomes first AWS partner validated for Autonomous Security Validation, as AI-driven continuous threat testing gains pace.
Dev team monitoring code pipelines with app security scanning

Archipelo, Checkmarx tie dev context to app security

Last month
#
devops
#
application security
#
devsecops
Archipelo and Checkmarx partner to fuse dev workflow signals with app security scans, giving teams origin evidence to prioritise fixes.
Moody engineer cicd pipelines morphing into shadowy hands vaults

JFrog flags 13 critical CI/CD flaws in GitHub workflows

Last month
#
siem
#
fintech
#
application security
JFrog warns 13 GitHub CI/CD workflow flaws, mostly critical, could let attackers hijack pipelines and steal secrets at scale.
Ai malware attack shadow figure targeting india australia maps

Bitdefender warns of AI 'vibeware' targeting India

Last month
#
malware
#
firewalls
#
network security
Bitdefender flags AI-powered 'vibeware' malware blitz hitting Indian government targets, using niche languages to overwhelm defences.
Asian engineer cybersecurity breach red warnings cloud repos

Claude Code flaws expose new risks in AI dev tools

Last month
#
devops
#
cloud security
#
application security
Claude Code flaws found by Check Point could let malicious repos run code and grab API keys before developers confirm a project is trusted.
Cinematic interlocking metal shields hybrid cloud identity security

Delinea buys StrongDM to boost AI-era identity security

Last month
#
virtualisation
#
devops
#
hybrid cloud
Delinea acquires StrongDM to create a unified, just-in-time identity security control plane for AI-driven and hybrid cloud environments.
Interlocking metal shields cloud zero trust ai security illustration

Delinea buys StrongDM to tackle AI-driven access risk

Last month
#
devops
#
hybrid cloud
#
pam
Delinea acquires StrongDM to fuse privileged access tools with just‑in‑time authorisation, tackling AI‑driven identity and access risks.