Tech
Businesses can learn a thing or two about security from darknet marketplaces
There’s no denying that darknet marketplaces and the kinds of forums where hackers meet are hotbeds of criminal activity
3 things you need to know about remote access Trojans
Remote access trojans (RATs) have become a significant concern for both individuals and organisations.
3 things you need to know about how the Tor browser works
Our personal data and browsing habits are constantly monitored and tracked by a range of entities.
Employees are still sharing source code with generative AI engines
A new report has shown that enterprise-grade workers are sharing sensitive data with generative AI engines such as ...
CISA urges Apple users to upgrade now to avoid ‘vulnerabilities in multiple products’
Apple has released a raft of updates for its mobile and desktop operating systems to address a number of bugs that could ...
Microsoft upgrades Windows 11’s phishing protection feature
Software giant Microsoft has rolled out a new addition to its Enhanced Phishing Protection in Microsoft Defender ...
You dirty RAT: New HotRat Trojan distributed via cracked software and games
Security researchers have uncovered a new malware campaign built around free and cracked versions of popular games and ...
Rapid7 unveils new collaborative risk reduction solution
Global cloud risk and threat detection provider Rapid7 has released its Executive Risk View solution, enabling security ...
ACSC issues critical alert on Citrix network firmware vulnerability
The Australian Cyber Security Centre (ACSC) has issued a critical alert after detecting a vulnerability in networking ...
Op-Ed: Artificial intelligence is challenging some norms of identity security
The age of AI has arrived and is driving important discussions at a number of levels.
Op-Ed: Artificial intelligence of today and the future – Helpful or security risk in disguise?
Artificial intelligence (AI) tools have garnered significant attention recently due to their impressive capabilities.
Hackers developing specialist Android security-bypassing spoofing tools
Security researchers have spotted threat actors developing new spoofing tools designed to bypass anti-fraud protections
Op-Ed: The limitations and role of AI in cyber security
Artificial intelligence has sparked a wave of excitement within the cyber security industry, holding the promise of ...