Security
Alert! CISA warns of 4 exploited vulnerabilities
A critical-severity SolarWinds Web Help Desk vulnerability has been added to the Known Exploited Vulnerabilities (KEV) ...
Employee responsible for ‘non-malicious’ data breach loses dismissal case
An employee who was terminated for a breach of company confidentiality and data security had her unfair dismissal case ...
Dragos, Microsoft collaborate to strengthen security for industrial and OT environments
OT cyber security specialist Dragos expands its collaboration with Microsoft, integrating more closely with Azure and ...
Exclusive: Cl0p cyber extortion group targets Australian IT providers and clients
The threat actor behind multiple mass extortion campaigns claims to have compromised a pair of Aussie IT service ...
It could happen here: What Australian organisations can learn from Russia’s 2025 attack on Poland’s electricity grid
Russia-linked hackers targeted Poland’s energy grid last year, an attack that Dragos’ Josh Hanrahan says should be a ...
Exclusive: Aussie data not compromised as part of cyber attack on Distinctive Systems
A ransomware group claims a hack of a tour operator management software developer with offices in the UK, US, and ...
Interview: Genetec’s Andrew Elvish – ‘A lot of companies are in it to IPO and make their shareholders super rich’
Cyber Daily chats about the changing state of physical security in 2026, the crossover with cyber security, and what ...
Open inspection: Real estate leasing platforms at major data leak risk, investigation reveals
New findings have revealed that popular platforms used by real estate agents may be putting millions of files containing ...
Jeffrey Epstein employed a private hacker, new documents reveal
The latest tranche of files relating to disgraced financier and sex offender Jeffrey Epstein reveals a “personal hacker” ...
Scammers target renters in tight WA market
A tight rental market in Western Australia has seen scammers posing as landlords on social media, with renters losing ...
The risks of AI implementation and how to mitigate them, with Lander Rogers' Melissa Tan
AI is the new future of work, and is being adopted by Australian businesses at a rapid rate. According to a 2025 report ...
Infamous North Korean hacking group divides in order to conquer
Labyrinth Chollima has evolved into three “distinct adversaries”, according to new CrowdStrike research.
Alert! Ivanti warns of exploitation of Endpoint Manager Mobile zero-days
CISA has added one of a pair of code injection vulnerabilities to the KEV catalogue as experts warn, “this is not a ...