GUEST RESEARCH: The Gemini Trifecta marks a dangerous shift in AI security as attackers could turn Gemini into the attack vehicle, not just target i
GUEST OPINION: The modern hacker is just as likely to be a teenager working from the Australian or US suburbs as a state sponsored operative working in North Korea or Russia, according to Google’s John Hultquist.
GUEST OPINION: “The recent ransomware incident impactingQantas is a stark reminder of the growing cyber risks facing the aviation sector. Hackers reportedly attacked one of the airline’s customer contact centres and penetrated a computer system used by a subcontractor. While specific details about how the attack occurred remain unclear, it reflects a broader regional trend: organisations are becoming increasingly vulnerable due to the size and complexity of their digital ecosystems — especially those involving third-party vendors and service providers.
A financially motivated cybercrime group is targeting multinational corporations through convincing phone-based scams designed to extract sensitive customer data from Salesforce systems, Google Cloud Security has warned.
GUEST OPINION: Semperis Cyber Predictions - Focusing on the rise of attacks against Active Directory, critical infrastructure and more.
“Sextortion” attacks are on the rise globally, with hackers using victims’ addresses and photos of their homes to personalise the attacks and increase the pressure to pay, according to new research byBarracuda.
GUEST OPINION: Internet service providers (ISPs) continue to be a top target for hacktivists globally. Free, a major internet service provider in France, is one of the latest victims. According to recent reports, Free’s systems were breached and customer information, impacting possibly 19 million users, was stolen.
GUEST OPINION: Passwords, the longstanding gatekeepers of digital security, remain a crucial yet vulnerable element in today's cybersecurity landscape.
Ticketing giant Ticketmaster has confirmed it was part of a data breach, potentially affecting hundreds of millions of customers around the world.
WikiLeaks founder and publisher Julian Assange has been granted leave by the UK High Court to appeal against a bid to extradite him to the US to stand trial on espionage charges.
GUEST INTERVIEW: Sumit Bansal, BlueVoyant's Head of APJ, talks to iTWire about how it helps CISOs and CIOs protect their company, assets and brand reputation from internal and external threats.
GUEST RESEARCH Infoblox has releasednew research unveiling a set of large-scale malicious cybercriminal partnerships led by insidious threat actor VexTrio. The partnerships involve a more than 60-strong underground affiliate network and are seeing high volumes of malware and other malicious content delivered to networks in Australia, New Zealand and across the globe.
COMPANY NEWS UPDATE : As production lines become increasingly reliant on interconnected computer systems, the risk of cybercriminal exploitation looms large.
ln an email to all affected customers, Dymocks has asserted that the breach did not occur in any computer system under their management.
Nearly 7 million Aussies have fallen victim to online shopping scams, it was revealed today as almost 11 million Australian shoppers prepare to embark on the biggest bargain hunts of the year.
Security vendor Radware has completed its Hacker’s Almanac. Series III – the final instalment – focuses on threat intelligence and cyber defence.
With 95% of cybersecurity breaches being caused by human error, alongside zero-days, sophisticated hacks, spear fishing, social engineering and more, Ben Jones explains the state of play in today's world of cybersecurity, and his partnership with famous White House hacker/prankster James Linton.
With 95% of cybersecurity breaches being caused by human error, alongside zero-days, sophisticated hacks, spear fishing, social engineering and more, Ben Jones explains the state of play in today's world of cybersecurity, and his partnership with famous White House hacker/prankster James Linton.
COMPANY NEWS: Barracuda, a trusted partner and leading provider of cloud-first security solutions, has released key findings about the ways spear-phishing attacks are evolving. The report, titled Spear Phishing: Top Threats and Trends Vol. 7 – Key findings on the latest social engineering tactics and the growing complexity of attacks, reveals fresh insights into recent trends in spear-phishing attacks and what you can do to protect your business.
Spot on Ms Roy. Along with this goes the trend to short, job ready courses at universities, expounded once by[…]
That MSI dragon laptop looks cool! But $11,799 ....... :O I might think on a bit longer :)
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]