News

Ransomware

Ransomware attacks growing in number, severity: Why experts believe it will get worse

Law enforcement and federal experts discuss recent ransomware trends and challenges of fighting the attacks.

Data viewed secretively with binoculars.

What data China collected about 35,000 Aussies—and 2.4 million people globally

Zhenhua Data defends “research”—but concerns mount over what Australia has discovered about Chinese gathering of personal data.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

Telstra taps Australian cyber cops to block SMS spoofing attacks

As COVID-19’s digital-services surge drives increased fraud, Defence Ministry helps government services agency identify legitimate communications.

frustrated waiting for the phone to ring 137888054

Just let week-long DDoS attack ‘fizzle out’, says NZ government

Authorities haven’t identified the perpetrators of rolling DDoS attacks that took down the NZX stock exchange and crippled other firms.

vulnerable breach cyberattack hacker

Evilnum group targets FinTech firms with new Python-based RAT

The attack hides in Windows systems by impersonating several legitimate programs.

Security threat   >   One endpoint on a network has been compromised.

APT-style mercenary groups challenge the threat models of many organizations

APT-for-hire services will broaden the scope of who is vulnerable to that type of attack. Small- and medium-sized companies in particular need to rethink their threat models.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

With cloud's security benefits comes systemic risks, report finds

A new report from the Carnegie Endowment for International Peace seeks to give law and policy makers a better understanding of cloud security risks.

Application security  >  Software code + data protected with a lock

IT managers urged to revisit security following hasty lockdown changes

CERT NZ cites a rise in ransomware and RDP attacks during the COVID-19 pandemic, at a time when companies may have made changes that compromise security.

security threat / hacker / attack

NZX New Zealand stock exchange suffers multi-day DDoS attack

Puzzlement among security experts that the bourse was unable to defend itself against the reoccurring attack.

trojan horse malware virus binary by v graphix getty

After a decade, Qbot Trojan malware gains new, dangerous tricks

New Qbot abilities include inserting malware in legitimate email threads to spread malware.

digital identity / authentication

People key as updated Australian cyber strategy targets ‘existential threats’

In the era of COVID-19 work-at-home, fostering individual responsibility over security is as important as government capabilities and industry collaboration.

A censorship label is splashed across an image of a man hiding behind his laptop.

TLS attacks and anti-censorship hacks

Despite safeguards in TLS 1.3, China is still censoring HTTPS communications, according to a new report. There are workarounds to this. Plus, how TLS can be used as an attack vector.

hybridcloud

Hybrid cloud complexity, rush to adopt pose security risks, expert says

Organizations rushing to adopt hosted cloud infrastructure alongside on-premises systems might not fully understand or address potential security threats.

dark secrets of devops code secret quiet by kristina flour unsplash

The state of application security: What the statistics tell us

Companies are moving toward a DevSecOps approach to application development, but problems remain with security testing ownership and open-source code vulnerabilities.

incoming emails / DNS security / locked server / parked domain

18 (new) ways attackers can compromise email

Researchers have discovered eighteen new vulnerabilities in how email systems authenticate senders, making it even easier for criminals to fool users.

Industry 4.0 / Industrial IoT / Smart Factory / Engineer conrols robotics via tablet.

Protocol gateway flaws reveal a weak point in ICS environments

Research presented at this week's Black Hat conference highlights a new threat via protocol translation attacks and reveals 9 flaws found in protocol gateways from different vendors.

computer crime scene / hacked / infected / cybercrime / cyberattack

15 signs you've been hacked—and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.

An australian iconic road sign with kangaroo showing a long road with bright blue sky

Threat intelligence puts on an Australian accent

Details of local breaches are being collated to inform a better cybersecurity response.

data keys encryption password by gerd altmann cc0 via pixabay

Mathematical Mesh alpha release promises better end-to-end encryption

Web pioneer proposes a new cryptographic system that relies on threshold key infrastructure to improve end-to-end encryption.

United States-United Kingdom flags with binary data flow under a magnifying lens.

What the end of Privacy Shield, Brexit mean for UK-US data flows

The fall of US data agreement further complicates the post-Brexit data situation for many companies.

Load More