Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

National security laws activated to bolster Aussie critical infrastructure protection

National security laws activated to bolster Aussie critical infrastructure protection

The Albanese government has activated national security laws designed to safeguard Australian critical infrastructure, ...

Mon, 22 Aug 2022
Chinese hackers continue to target NGOs and governments, cyber security firm says

Chinese hackers continue to target NGOs and governments, cyber security firm says

Cyber security firm Recorded Future has found that Amnesty International and Taiwan’s ruling party have been targeted by ...

Mon, 22 Aug 2022
New report reveals ransomware variants have doubled in 6 months

New report reveals ransomware variants have doubled in 6 months

FortiGuard has reported ransomware variants have almost doubled in the past six months, with exploit trends ...

Mon, 22 Aug 2022
BeyondTrust Password Safe and BeyondInsight updates released

BeyondTrust Password Safe and BeyondInsight updates released

BeyondTrust has announced the release of BeyondTrust Password Safe 22.2 and BeyondInsight 22.2.

Mon, 22 Aug 2022
PODCAST: Strengthening ICS/OT resilience against ransomware, with Dr Tom Winston

PODCAST: Strengthening ICS/OT resilience against ransomware, with Dr Tom Winston

In this episode of the Cyber Security Uncut podcast, Dr Tom Winston, director of intelligence content at Dragos joins ...

Robyn Tongol Mon, 22 Aug 2022
Labor to overhaul national cyber security strategy

Labor to overhaul national cyber security strategy

The Albanese government is set to reform former prime minister Scott Morrison’s $1.7 billion, 10-year cyber security ...

Fri, 19 Aug 2022
Xiaomi mobile payment vulnerability could facilitate forged transactions

Xiaomi mobile payment vulnerability could facilitate forged transactions

A recent Check Point Research analysis has found that vulnerabilities on Xiaomi’s mobile payment mechanism could allow ...

Fri, 19 Aug 2022
Absolute Software bolsters secure endpoint portfolio

Absolute Software bolsters secure endpoint portfolio

Absolute Software is re-enforcing the company’s commitment to empower customers with new innovations to its secure ...

Fri, 19 Aug 2022
The Security of Critical Infrastructure Act reforms, explained

The Security of Critical Infrastructure Act reforms, explained

While the new reforms to the Security of Critical Infrastructure Act are extensive, they put Australia ahead of the rest ...

Lauren Croft Thu, 18 Aug 2022
archTIS unveils new SaaS offering for secure information sharing

archTIS unveils new SaaS offering for secure information sharing

The ASX-listed cyber security company has launched a new platform designed to support secure document sharing.

Thu, 18 Aug 2022
ACCC to probe social media competition and consumer concerns

ACCC to probe social media competition and consumer concerns

As part of the sixth interim report of the ACCC’s five-year Digital Platform Services Inquiry, the consumer watchdog ...

Wed, 17 Aug 2022
Dynatrace bolsters real-time visibility and vulnerability across entire application stack

Dynatrace bolsters real-time visibility and vulnerability across entire application stack

To detect and protect against vulnerabilities in runtime environments, Dynatrace has extended its application security ...

Wed, 17 Aug 2022
The threat of supply chain attacks and what you can do to prevent one

The threat of supply chain attacks and what you can do to prevent one

Addressing the possibility of “supply chain attacks” by malicious actors is an important step in protecting your ...

Ajay Unni Wed, 17 Aug 2022