Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Google raises alarm on Italian spyware infiltrating Apple and Android phones

Google raises alarm on Italian spyware infiltrating Apple and Android phones

Alphabet Inc's Google reported that an Italian company’s hacking tools were used to spy on Apple Inc and Android ...

Fri, 24 Jun 2022
Australia holds the keys to understanding delays to security patching

Australia holds the keys to understanding delays to security patching

Organisations don’t always patch their systems quickly enough to avoid intrusions or attacks; Rohan Langdon at ExtraHop ...

Rohan Langdon Fri, 24 Jun 2022
PODCAST: Understanding regulatory complexity in cyber security, with Cameron Whittfield

PODCAST: Understanding regulatory complexity in cyber security, with Cameron Whittfield

In this episode of the Cyber Security Uncut podcast, Cameron Whittfield, partner at Herbert Smith Freehills, joins hosts ...

Robyn Tongol Fri, 24 Jun 2022
Cyber criminals thriving off the DIY ransomware kit business

Cyber criminals thriving off the DIY ransomware kit business

Tenable has found the self-sustaining ransomware industry earned $692 million from collective attacks in 2020, and ...

Thu, 23 Jun 2022
SolarWinds to release open-source software based on SUNBURST attack learnings

SolarWinds to release open-source software based on SUNBURST attack learnings

SolarWinds aims to become a model for enterprise software security after announcing its new Next-Generation Build ...

Thu, 23 Jun 2022
Australia only 27% at risk of falling victim to cyber attacks, report finds

Australia only 27% at risk of falling victim to cyber attacks, report finds

Avast has released its first Digital Wellbeing Report which revealed that people living in countries with more digital ...

Thu, 23 Jun 2022
Top 3 trade-offs commonly encountered in identity security circles

Top 3 trade-offs commonly encountered in identity security circles

Organisations can see a pathway to secure systems that doesn’t come at the cost of user experience, writes Steve Dillon, ...

Steve Dillon Thu, 23 Jun 2022
archTIS wins new multi-million-dollar Defence deal

archTIS wins new multi-million-dollar Defence deal

The cyber security firm has secured a contract to broaden its offering to Defence.

Thu, 23 Jun 2022
China-linked APT hacking group targeting Australia and South-East Asia

China-linked APT hacking group targeting Australia and South-East Asia

SentinelLabs reports that it has newly discovered a China-linked APT named “Aoqin Dragon” that has been spying on ...

Wed, 22 Jun 2022
UniSA and colleagues design scanning tool to curb hacking

UniSA and colleagues design scanning tool to curb hacking

In collaboration with an international team of researchers, UniSA has helped with developing a scanning tool designed to ...

Wed, 22 Jun 2022
The linkages between privileged access management and zero trust

The linkages between privileged access management and zero trust

Most IT security teams are familiar with the concept of using traditional privileged access management (PAM) solutions ...

Scott Hesford Wed, 22 Jun 2022
Russian state-backed hacking group Fancy Bear linked to malware campaigns in Ukraine

Russian state-backed hacking group Fancy Bear linked to malware campaigns in Ukraine

Ukraine cyber security officials have warned that Russian-backed hacking group “Fancy Bear” has conducted two hacking ...

Wed, 22 Jun 2022
Missile sirens in Israel set off by suspected cyber attack

Missile sirens in Israel set off by suspected cyber attack

Missile attack sirens blared in two cities in Israel over the weekend and local reports have speculated that cyber ...

Tue, 21 Jun 2022