Powered by MOMENTUMMEDIA
For breaking news and daily updates,
subscribe to our newsletter.
Explore
SECTIONS
MORE
Microsoft has observed at least three China-backed threat actors targeting internet-facing SharePoint servers.
David Hollingworth • Wed, 23 Jul 2025
Trump posts AI video of Obama being arrested
US President Donald Trump has posted an AI-generated video of former president Barack Obama being arrested by FBI agents
Daniel Croft • Tue, 22 Jul 2025
Qantas hack: Court documents reveal scope of communications between hackers and the Flying Kangaroo
A self-identified hacking “collective” made several attempts to open communications with Qantas before the airline ...
David Hollingworth • Tue, 22 Jul 2025
Around 100 organisations affected in Microsoft SharePoint data incident
Roughly 100 organisations have been affected by a major espionage campaign targeting Microsoft-owned SharePoint server ...
Ring blames mysterious logins on back-end update, but customers are not so sure
Digital home security firm Ring denies a hack and says an update was responsible for a rash of mysterious logins on 28 ...
Dell confirms World Leaks hack, but says exposed data effectively ‘fake’
A ransomware group has gotten into one of Dell’s demo environments and stolen more than a terabyte of data.
ASIC sues Fortnum Private Wealth over alleged cyber security failures
The corporate regulator has announced it is suing advice business Fortnum Private Wealth for alleged cyber security ...
Keith Ford • Tue, 22 Jul 2025
Netflix breaks ground with ‘first GenAI final footage’ to appear on screen
Netflix has confirmed that generative AI was used in one of the latest offerings on its platform, highlighting both the ...
Daniel Croft • Mon, 21 Jul 2025
Interview: Courtney Guss – ‘I think sometimes you just have to prove that it works’
We chatted with Semperis’ director of crisis management about the importance of diversity and the necessity to manage ...
David Hollingworth • Mon, 21 Jul 2025
Exclusive: Akira claims successful hack of LeasePLUS
A novated lease services provider that handles government customers was hit by an alleged ransomware attack, with ...
Meta rejects EU’s AI Code of Practice, refuses to sign
Social media and AI giant Meta has refused to sign the code of practice the EU has outlined in its AI Act, which would ...
Data of all 6.5m Co-op members stolen in cyber attack
Major UK retailer Co-op has revealed that the cyber attack it suffered earlier this year resulted in the data of all of ...
Exclusive: INC Ransom claims pair of Australian victims
Terry Ringland Chartered Accountants and South East Country Vets have both been listed on hackers’ darknet leak site
ACSC circulates ‘act now’ alert over critical Microsoft Office SharePoint Server vulnerability
CVE-2025-53770, also known as ToolShell, is already being actively exploited in the wild, and both government and ...
The challenges and advantages of energy-efficient AI
The rise of generative AI tools comes with a heavy environmental cost – but it doesn’t have to be that way, one expert ...
David Hollingworth • Fri, 18 Jul 2025
Millions could be compensated over major Qantas data breach
A national law firm has lodged a representative complaint against Qantas, seeking compensation on behalf of millions of ...
Grace Robbie • Fri, 18 Jul 2025
1 in 12 employees globally use Chinese generative AI tools
New research has revealed the scope of workers using tools such as DeepSeek, with sensitive business data commonly ...
Qantas obtains injunction to prevent hacked data’s release
Qantas has obtained a court injunction to prevent any person or organisation from publishing the customer information ...
Adam Thorn • Thu, 17 Jul 2025
UAP confirms ransomware attack, personal data and email correspondence exposed
Clive Palmer’s United Australia Party has informed its members of a data breach, but admits “it is impracticable to ...
David Hollingworth • Thu, 17 Jul 2025
Australia adopts AS IEC 62443 as national cyber security standard to protect critical infrastructure
Newly adopted standards offer a clearer and more structured approach to protecting operational technology in critical ...