Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Hackers exploiting 36 ‘significant’ vulnerabilities, CISA warns

Hackers exploiting 36 ‘significant’ vulnerabilities, CISA warns

The United States Cybersecurity and Infrastructure Security Agency (CISA) has encouraged consumers to patch immediately ...

Mon, 27 Jun 2022
Overcoming the challenges faced by a modern-day SOC

Overcoming the challenges faced by a modern-day SOC

Security operations centres (SOCs) play a vital role in today’s IT infrastructures. However, they are also faced with ...

Michael Bovalino Mon, 27 Jun 2022
Conti ransomware gang attacked 850 companies in 2 years

Conti ransomware gang attacked 850 companies in 2 years

Singapore-based cyber security company Group-IB has published its findings about ARMattack, identifying it as one of the ...

Mon, 27 Jun 2022
New report finds 101% spike in email threats

New report finds 101% spike in email threats

Trend Micro reports that it blocked over 33.6 million cloud email threats in 2021, a 101 per cent increase on the ...

Fri, 24 Jun 2022
Chinese hackers spying undetected, leveraging ransomware as a diversion

Chinese hackers spying undetected, leveraging ransomware as a diversion

Secureworks has linked two HUI Loader activity clusters to China-based threat groups based on their new research on HUI ...

Fri, 24 Jun 2022
Google raises alarm on Italian spyware infiltrating Apple and Android phones

Google raises alarm on Italian spyware infiltrating Apple and Android phones

Alphabet Inc's Google reported that an Italian company’s hacking tools were used to spy on Apple Inc and Android ...

Fri, 24 Jun 2022
Australia holds the keys to understanding delays to security patching

Australia holds the keys to understanding delays to security patching

Organisations don’t always patch their systems quickly enough to avoid intrusions or attacks; Rohan Langdon at ExtraHop ...

Rohan Langdon Fri, 24 Jun 2022
PODCAST: Understanding regulatory complexity in cyber security, with Cameron Whittfield

PODCAST: Understanding regulatory complexity in cyber security, with Cameron Whittfield

In this episode of the Cyber Security Uncut podcast, Cameron Whittfield, partner at Herbert Smith Freehills, joins hosts ...

Robyn Tongol Fri, 24 Jun 2022
Cyber criminals thriving off the DIY ransomware kit business

Cyber criminals thriving off the DIY ransomware kit business

Tenable has found the self-sustaining ransomware industry earned $692 million from collective attacks in 2020, and ...

Thu, 23 Jun 2022
SolarWinds to release open-source software based on SUNBURST attack learnings

SolarWinds to release open-source software based on SUNBURST attack learnings

SolarWinds aims to become a model for enterprise software security after announcing its new Next-Generation Build ...

Thu, 23 Jun 2022
Australia only 27% at risk of falling victim to cyber attacks, report finds

Australia only 27% at risk of falling victim to cyber attacks, report finds

Avast has released its first Digital Wellbeing Report which revealed that people living in countries with more digital ...

Thu, 23 Jun 2022
Top 3 trade-offs commonly encountered in identity security circles

Top 3 trade-offs commonly encountered in identity security circles

Organisations can see a pathway to secure systems that doesn’t come at the cost of user experience, writes Steve Dillon, ...

Steve Dillon Thu, 23 Jun 2022
archTIS wins new multi-million-dollar Defence deal

archTIS wins new multi-million-dollar Defence deal

The cyber security firm has secured a contract to broaden its offering to Defence.

Thu, 23 Jun 2022