News

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.
data breach predictions

a clock half-submerged in water

Cloud configuration drift leaves organizations open to attack, research finds

Undocumented cloud configuration changes, whether done by attackers or for legitimate business reasons, present a significant security threat.

intro security vulnerability

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now.

COVID-19 contact tracing app

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

water infrastructure / wastewater treatment facility / sewage treatment plant

Attempted cyberattack highlights vulnerability of global water infrastructure

Water utilities often have few cybersecurity resources and are subject to few regulations. A failed Stuxnet-like attack on Israel's water supply shows how dangerous that could be.

ransomware attack

Second ransomware strike is déjà vu for Australian logistics giant Toll

Three months after crippling Mailto ransomware strike, customer systems are once again down as Nefilim threatens possible data dump.

A roll of hundred dollar bills sits atop a silhouette of virus morphology.

Salesforce unveils tools for a post-pandemic return to the office

Work.com contains apps and information resources to support organizations as business looks to resume operations in many countries.

Blazing, fiery cloud raining binary code.

Cloud servers hacked via critical SaltStack vulnerabilities

Attackers were quick to exploit recently announced vulnerabilities to deploy cryptominers. Patch Salt now.

coronavirus covid 19 pandemic disease binary map world 5060518 by mintblack4u pixabay cc0 2400x1600

COVID-19 attack campaigns target hardest hit regions, research shows

Attackers shift their focus to where coronavirus infections are rising and use tactics that make their efforts hard to block.

sucessfully transitioning to devsecops

Devsecops gains momentum in Australia

Tools, vendors, and prior knowledge aplenty as government ‘sprint teams’ coach Australian agencies on secure application development.

young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

Update: Coronavirus prompts collaboration tool makers to offer wares for free

Several vendors, including Microsoft, Google, Slack, Zoom, Cisco and LogMeIn, are making chat, videoconferencing and other collaboration services free as demand for remote working booms.

A binary eye peers through a broken network  >  data breach / security break / privacy violation

How the COVIDSafe app could pierce your privacy — and change Australia’s privacy equation

Technical analysis picks apart app as experts warn of potential for broad-based surveillance.

Android mobile phone code

Android security: Patching improves, but fragmentation challenges remain

A new report shows that Android mobile device manufacturers are getting better at patching the OS, but patching levels vary across models and vendors.

health doc connect care telemedicine

Telehealth booms amid COVID-19 crisis; virtual care is here to stay

The coronavirus pandemic that has erupted worldwide has pushed telehealth to the forefront. It's unlikely remote medicine will go away, even after the current crisis abates.

podcast image template

Podcast: Is end-to-end encryption for videoconferencing important?

More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...

protective shield / binary code / COVID-19 coronavirus morphology

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

The COVID-19 Cyber Threat Intelligence League and other groups cooperate with the industry, law enforcement, and the government to prevent attacks on healthcare providers.

silver platter passwords exposed authentication hacked vulnerable security breach

Austal breach analysis a reminder that Australia can do better on credentials

As cyber criminals capitalise on COVID-19 chaos, CSOs should take time to improve credential hygiene.

Zero-trust

Google enters zero-trust market with BeyondCorp Remote Access offering

Google makes its internal zero-trust access infrastructure available to anyone on a subscription basis as an alternative to VPNs.

Load More