Effective resilience requires more than just security tools
Sep 17 2025Do you have your security architecture in order?
Do you have your security architecture in order?
Follows attack on LVMH in Hong Kong.
Unknown amount of personal information harvested.
Gleans unique information on modus operandi and tools.
Can bypass common multi-factor authentication.
New hardware defence integrated with operating system safety features.
Developers targeted in new hacking campaign.
Criminals evolve into professional as-a-service operators.
Plans to mandate passkey adoption by end of this year.
Incident root cause clarified.