Security
Microsoft catches North Korean-backed hackers exploiting flaw in DevOps tool
Security researchers have observed two groups taking advantage of a remote code execution flaw in the TeamCity ...
D-Link suffers cyber attack, says stolen data is ‘outdated’
Taiwanese network hardware manufacturer D-Link has announced that it has suffered a cyber attack, with the threat actor ...
ServiceNow flaw may have left data exposed since 2015
A potential vulnerability in ServiceNow that could have left user data exposed for as long as eight years has been ...
ASIO boss warns of Chinese intellectual property theft and infiltration
Mike Burgess has declared the current rate of Chinese industrial espionage as “unprecedented and unacceptable”.
CISA and international agencies release updated secure-by-design white paper
Australia and New Zealand co-sign new guidance in Shifting the Balance of Cybersecurity Risk: Principles and Approaches ...
Cyber Security Awareness Month: The AFP on remote access scams
Remote access scams don’t rely on any digital intrusions other than asking for an invite.
Australian Cyber Security Centre releases critical alert over Cisco IOS XE vulnerability
The flaw could lead to a remote takeover of a system, the ACSC warns.
Vietnamese spies attempt to plant spyware on US officials
US members of Congress and other officials were targeted by Vietnamese government spies attempting to plant spyware on ...
Scammers take advantage of Israel-Gaza conflict with fake crypto charity scams
Opportunistic scammers are already taking advantage of human suffering during the ongoing crisis in the Gaza Strip.
How AI-powered risk management solutions can support cybersecurity and build trust
As a purpose-driven organization, BSI believes AI can be a force for good, changing lives, making a positive impact on ...
Cyber Security Awareness Month: What to do if you see distressing content online
It’s all too easy to see content online that is distressing or violent in nature – here’s what you can do if you come ...
Aussie researchers trial technology to prevent MitM attacks on military robots
An algorithm designed to prevent man-in-the-middle (MitM) attacks targeting unmanned military weapons and vehicles has ...
Why filling the talent gap is cyber’s biggest challenge
Cybersecurity Awareness Month is often focused on convincing the public to develop healthier habits, creating a ...