Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Supply chain risk: Understanding the weakest link in cyber security

Supply chain risk: Understanding the weakest link in cyber security

For CISOs, managing supply chain risk is no longer a compliance exercise – it’s a core pillar of resilience.

David Hollingworth Fri, 26 Sep 2025
Penny Wong warns UN Security Council of the dangers of mixing AI with nuclear weapons

Penny Wong warns UN Security Council of the dangers of mixing AI with nuclear weapons

Australia’s Foreign Minister riffs on artificial intelligence, deepfakes, and the “collapse of truth altogether” in a ...

David Hollingworth Fri, 26 Sep 2025
Volvo North America confirms third-party data breach

Volvo North America confirms third-party data breach

Car maker informs employees of compromised personal data following ransomware attack on human resources software firm ...

David Hollingworth Fri, 26 Sep 2025
Act now! ACSC, CISA warn of active exploitation of Cisco firewalls

Act now! ACSC, CISA warn of active exploitation of Cisco firewalls

Aussie cyber agency warns of “targeting of multiple vulnerabilities within Australia” as Cisco says active exploitation ...

David Hollingworth Fri, 26 Sep 2025
Australian NFP sector faces 59% increase in ransomware activity

Australian NFP sector faces 59% increase in ransomware activity

In light of the increased threat of cyber crime, NFPs are training to protect themselves using interactive cyber attack ...

Daniel Croft Thu, 25 Sep 2025
Collins Aerospace hack: Suspect arrested and RTX files Form 8-K

Collins Aerospace hack: Suspect arrested and RTX files Form 8-K

The UK’s National Crime Agency reports arrest of a man in his 40s as Collins Aerospace owner RTX informs SEC of cyber ...

David Hollingworth Thu, 25 Sep 2025
AI Degrees: The Latest in Upskilling for Cybersecurity Specialists?

AI Degrees: The Latest in Upskilling for Cybersecurity Specialists?

Innovations into LLMs over the past few years in particular have opened up new pathways for ICT sector professionals – ...

Matthew Kayser Thu, 25 Sep 2025
Security researchers spot high-impact vulnerability in OxygenOS Android phones

Security researchers spot high-impact vulnerability in OxygenOS Android phones

Several OnePlus smartphones running OxygenOS were found to have an unfixed permission bypass vulnerability that could ...

David Hollingworth Wed, 24 Sep 2025
GitHub to address npm supply chain as CISA warns of spreading Shai-Hulud worm

GitHub to address npm supply chain as CISA warns of spreading Shai-Hulud worm

Popular code repository GitHub is taking action against hackers targeting popular JavaScript code packages to spread ...

David Hollingworth Wed, 24 Sep 2025
Jaguar Land Rover was negotiating a cyber insurance at time of cyber attack

Jaguar Land Rover was negotiating a cyber insurance at time of cyber attack

Britain’s largest car manufacturer, Jaguar Land Rover (JLR), was reportedly in the process of securing cyber insurance ...

Daniel Croft Wed, 24 Sep 2025
SolarWinds releases third Web Help Desk patch to address known flaw

SolarWinds releases third Web Help Desk patch to address known flaw

Exploitation of the latest patch bypass vulnerability is “only a matter of time”, according to one security expert.

David Hollingworth Wed, 24 Sep 2025
TikTok collected sensitive data of Canadian children, says privacy commission

TikTok collected sensitive data of Canadian children, says privacy commission

Major short-form video social media platform TikTok has been collecting the data of Canadian children, according to ...

Daniel Croft Wed, 24 Sep 2025
Dragos launches Dragos Platform 3.0 to speed up industrial cyber defence

Dragos launches Dragos Platform 3.0 to speed up industrial cyber defence

Cyber security firm Dragos has unveiled AI-enhanced vulnerability analysis and a new Insights Hub to help critical ...

David Hollingworth Wed, 24 Sep 2025