Breaking news and updates daily. Subscribe to our Newsletter
Explore
SECTIONS
MORE
Organisations can see a pathway to secure systems that doesn’t come at the cost of user experience, writes Steve Dillon, head of APAC architecture at Ping Identity.
Steve Dillon • Thu, 19 Sep 2024
archTIS wins new multi-million-dollar Defence deal
The cyber security firm has secured a contract to broaden its offering to Defence.
• Thu, 23 Jun 2022
China-linked APT hacking group targeting Australia and South-East Asia
SentinelLabs reports that it has newly discovered a China-linked APT named “Aoqin Dragon” that has been spying on organisations in Australia and South-East Asia for over ...
• Wed, 22 Jun 2022
UniSA and colleagues design scanning tool to curb hacking
In collaboration with an international team of researchers, UniSA has helped with developing a scanning tool designed to reduce website vulnerability from getting hacked ...
The linkages between privileged access management and zero trust
Most IT security teams are familiar with the concept of using traditional privileged access management (PAM) solutions to secure critical elements within their ...
Scott Hesford • Wed, 22 Jun 2022
Russian state-backed hacking group Fancy Bear linked to malware campaigns in Ukraine
Ukraine cyber security officials have warned that Russian-backed hacking group “Fancy Bear” has conducted two hacking campaigns spreading malware via email.
Missile sirens in Israel set off by suspected cyber attack
Missile attack sirens blared in two cities in Israel over the weekend and local reports have speculated that cyber actors based in Iran triggered the false alarms.
• Tue, 21 Jun 2022
Massive cyber attacks predicted to persist until Russian invasion ends
Cyber-physical systems will continue to be targeted by malicious cyber actors via distributed denial-of-service (DDoS) attacks, increased malware activity, targeted ...
US Flagstar Bank hacked, 1.5m customer data exposed
Hackers accessed 1.5 million Flagstar Bank customers’ personal data, the US financial services provider has disclosed.
Snake Keylogger identified as top malware circulating in Australia
Check Point Research (CPR) has reported that the Snake Keylogger malware has claimed first place in Australia and eighth place globally after a long absence from the ...
• Mon, 20 Jun 2022
Immutable backups are commanding a greater share of cyber security budgets
When preventative measures do not stop an attack, the focus rightly shifts to recovery, Aden Axen, cloud services manager at Somerville writes.
Aden Axen • Mon, 20 Jun 2022
Cyber criminals leveraging OT security gaps, study finds
Fortinet’s 2022 State of Operational Technology and Cyber Security Report has revealed the widespread gaps in industrial security after 93 per cent of OT organisations ...
Insitec wins new $43.5m Defence ICT contract
The ICT firm will continue delivering its services to Defence after securing a new deal.