Security
Op-Ed: Why boards and executives need to prioritise an agile cyber security strategy to keep cyber failures at bay
Despite cyber security being on board agendas more than ever before over the past 24 months and having adequate cyber ...
Report: Australian companies behind the global curve on cyber security
Under-reporting, lack of budget, and small staff numbers are hobbling Australia’s ability to handle growing cyber ...
Energy One says cyber incident had no sign of malicious activity
Investigations into the cyber incident it suffered back in August have shown no signs of malicious activity, according ...
DoS attack on royal family claimed by pro-Russian hackers
An attack on the website of the British Royal Family that saw it taken down has been claimed by pro-Russian hackers.
Canadian Air Force and government sites hacked by Indian threat actor
Websites belonging to Canadian military and government agencies have been hit by India based hackers, resulting in ...
Cyber security top of mind for Aussie businesses
Recent data released by Australian law firm Maddocks has revealed that cyber security is the largest perceived ...
US National Security Agency to stand up AI security centre
The outgoing head of the US National Security Agency has announced that the NSA will establish an artificial ...
Makers of MOVEit file transfer app report new flaws in its FTP software, exploitation under way
An Australian cyber security company has helped find a raft of new vulnerabilities in Progress Software’s WS_FTP Server ...
Ransomware gang posts 30GB of data it claims belongs to Victorian real estate group
The Ragnar Locker gang is claiming to have breached Network Pacific Real Estate following a failure in negotiations.
Chinese hackers steal 60,000 US State Department emails
At least 60,000 emails have been stolen from the US State Department after Chinese hackers breached Microsoft’s Exchange ...
Chinese state-sponsored hackers observed hiding in legacy Cisco routers
A raft of agencies have released a cyber security advisory warning of a threat actor with links to the People’s Republic ...
3 things you need to know about living-off-the-land tactics
Network defenders are continually adapting to the evolving tactics of cyber criminals. One particular tactic that has ...
Op-Ed: Breaking zero trust into bite-sized pieces
It sometimes helps to think smaller to achieve something much bigger. Zero trust is broadly understood as a way to ...