Security
Aussie privacy regulator to kick off 2026 with first-ever compliance sweep
The Office of the Australian Information Commissioner (OAIC) will conduct a targeted review of businesses’ privacy ...
Proofpoint closes US$1.8bn Hornetsecurity acquisition
Cyber security firm Proofpoint announces a new business unit and a major expansion of its Microsoft 365 security ...
Rent tech ruse: Almost half of Victorian renters exposed to unnecessary data risks and expenses
A new report has found that almost half of renters in Victoria are exposed to data risks and hidden expenses from being ...
CISA warns of D-Link router vulnerability exploitation
A D-Link issue and an Array OS vulnerability have been added to the US cyber agency’s list of known exploited ...
Australian Charities and Not-for-profits Commission warns of fake charity scams
As donations “flatline,” ACNC commissioner says “there are scammers out there ready to exploit people’s generosity”.
Exclusive: Aussie jeweller BECKS confirms hack following SafePay claims
An Australian jewellery brand has confirmed that it suffered a cyber incident, following claims made by ransomware group ...
Unveiling Warp Panda, a speedy new Chinese threat actor targeting VMware environments
A China-nexus hacking group has been observed maintaining long-term access and deploying BRICKSTORM malware on ...
Social media ban: What should parents tell their kids?
Within days, Australian children under the age of 16 will be kicked off social media – if you’re a parent, here’s how ...
React2Shell: Dozens breached, tens of thousands vulnerable, including 500+ in Australia
Analysts warned CVE-2025-55182 could be a dangerous vulnerability – sadly, they were right, as Chinese hackers enjoy a ...
CommBank launches national tech skills push to help small businesses adopt AI
Commonwealth Bank partners with OpenAI to deliver AI and cyber security education, as new data shows nearly half of ...
Second ScadaBR vulnerability added to Known Exploited Vulnerability Catalog
Hackers are targeting the second of two four-year-old vulnerabilities in the open-source supervisory control and data ...
Exclusive: Textile supplier Instyle listed by INC Ransom hackers
A ransomware group claims to have stolen more than 60 gigabytes of data from Instyle, with HR and customer data ...
Op-Ed: Hiding in the dark – the risk of shadow AI on businesses
AI may be an exciting revolution, but its rapid uptake by individual workers brings with it a fundamental risk.