Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Scammers Use Travel SIM Sales to Steal Identity Documents

Most organisations spend serious money on firewalls, endpoint protection, and threat monitoring. Yet one of the most commonly exploited attack surfaces gets far less attention: the APIs quietly running underneath almost every modern application. APIs are the connective tissue of today's digital infrastructure. They allow apps to talk to each other, enable third-party integrations, and power the real-time data exchanges that businesses depend on daily. They are also a favourite target for attackers who know that many organisations have not secured them properly.

The Hidden Security Risks Living Inside Your APIs

Most organisations spend serious money on firewalls, endpoint protection, and threat monitoring. Yet one of the most commonly exploited attack surfaces gets far less attention: the APIs quietly running underneath almost every modern application. APIs are the connective tissue of today's digital infrastructure. They allow apps to talk to each other, enable third-party integrations, and power the real-time data exchanges that businesses depend on daily. They are also a favourite target for attackers who know that many organisations have not secured them properly.

DDI Central 6.1: Enhanced IPAM visibility, root hint templates, trusted feeds in threat intelligence, and more

Previously, DDI Central version 6.0 introduced several enhancements designed to elevate the administrative experience, including streamlined importing of multiple servers in Windows environments, granular control over network resources through hierarchical roles, and a more in-depth view of network clusters. Now, DDI Central version 6.1 delivers broader and more comprehensive visibility into IP Address Management, featuring enhanced segmentation and multiple viewing options.

NAKIVO Backup & Replication v11.2 Drives Innovation and Global Expansion

NAKIVO Inc., a trusted provider of backup, disaster recovery and ransomware protection solutions, announced the general availability of NAKIVO Backup & Replication v11.2 on March 10, 2026. The release advances the company's ongoing commitment to helping organizations protect critical data across increasingly complex IT environments. The new version arrives amid significant business momentum, with over 16,000 active customers now operating across 191 countries.

The Dependency Dilemma: Balancing Innovation Speed with Supply Chain Resilience

Development teams are shipping faster than ever. Generative AI coding assistants, early agentic workflows, and increasingly modular architectures have compressed the distance between concept and deployment. AI-enabled innovation has become an executive mandate, and teams are expected to deliver at speed without sacrificing security or compliance.

Bell Cyber & WatchGuard Partner to Deliver Enterprise Security for Canadian SMEs

Canadian small and midsize businesses are increasingly targeted by sophisticated cyber threats, yet most lack the internal resources required to deploy and operate enterprise-level security. Today, WatchGuard and Bell Cyber are addressing that gap through a new strategic partnership and the launch of CyberShield Connect, a fully managed cybersecurity service designed specifically for Canadian SMEs.

Ransomware Attacks Surge by 50% Even as Payments Drop

The number of ransomware attacks increased by 50% in 2025, even though the number of victims who decided to pay the ransom fell to an all-time low, according to a new report from Chainalysis. The size of the ransom for victims who did pay increased significantly, growing 368% year-over-year to nearly $60,000. The total ransom payments observed by Chainalysis last year amounted to $820 million.