Security
National security laws activated to bolster Aussie critical infrastructure protection
The Albanese government has activated national security laws designed to safeguard Australian critical infrastructure, ...
Chinese hackers continue to target NGOs and governments, cyber security firm says
Cyber security firm Recorded Future has found that Amnesty International and Taiwan’s ruling party have been targeted by ...
New report reveals ransomware variants have doubled in 6 months
FortiGuard has reported ransomware variants have almost doubled in the past six months, with exploit trends ...
BeyondTrust Password Safe and BeyondInsight updates released
BeyondTrust has announced the release of BeyondTrust Password Safe 22.2 and BeyondInsight 22.2.
PODCAST: Strengthening ICS/OT resilience against ransomware, with Dr Tom Winston
In this episode of the Cyber Security Uncut podcast, Dr Tom Winston, director of intelligence content at Dragos joins ...
Labor to overhaul national cyber security strategy
The Albanese government is set to reform former prime minister Scott Morrison’s $1.7 billion, 10-year cyber security ...
Xiaomi mobile payment vulnerability could facilitate forged transactions
A recent Check Point Research analysis has found that vulnerabilities on Xiaomi’s mobile payment mechanism could allow ...
Absolute Software bolsters secure endpoint portfolio
Absolute Software is re-enforcing the company’s commitment to empower customers with new innovations to its secure ...
The Security of Critical Infrastructure Act reforms, explained
While the new reforms to the Security of Critical Infrastructure Act are extensive, they put Australia ahead of the rest ...
archTIS unveils new SaaS offering for secure information sharing
The ASX-listed cyber security company has launched a new platform designed to support secure document sharing.
ACCC to probe social media competition and consumer concerns
As part of the sixth interim report of the ACCC’s five-year Digital Platform Services Inquiry, the consumer watchdog ...
Dynatrace bolsters real-time visibility and vulnerability across entire application stack
To detect and protect against vulnerabilities in runtime environments, Dynatrace has extended its application security ...
The threat of supply chain attacks and what you can do to prevent one
Addressing the possibility of “supply chain attacks” by malicious actors is an important step in protecting your ...