Facebook has confirmed reports that a public server containing hundreds of millions of user phone numbers has been discovered online.
Trend Micro's Midyear Security Roundup for the first half of the year identifies trends including the growing use of fileless malware designed to avoid detection.
Almost half of Australians are concerned over the security and privacy of their digital health records, according to a new report.
The ASD has published a list of the devices that have been evaluated under its ASD Cryptographic Evaluation and High Assurance evaluation programs.
Malicious attacks accounted for 62% of data breach notifications reported in the June quarter, with human error the cause of a further 34%.
Australia's Independent National Security Legislation Monitor, Dr James Renwick, has launched a review into the components of the contentious national encryption bill.
CDN and cloud service provider Akamai has opened a new DDoS attack traffic scrubbing centre in Melbourne to complement its existing facility in Sydney.
OVIC has found Public Transport Victoria to be in breach of the state's Privacy Act by publicly releasing travel records for 15.2m myki cards.
Microsoft patched four critical RCE vulnerabilities in the remote desktop services component of Windows, including two with BlueKeep-like wormable capabilities.
Mimecast dug through over 67 billion emails rejected as spam, opportunistic and targeted attacks and impersonation detections to map the cyberthreat landscape.
Cyber attackers are turning their focus to SMBs as larger corporations tighten their security, according to cybersecurity firm CTRL Group.
The phishing filters used by various email service providers failed to detect a significant majority of simulated phishing emails sent during a UK experiment.
The Association of IT Asset Management has urged the US government to act on a report finding pervasive cybersecurity failures across US federal agencies.
Carbon Black's Cognitive Attack Loop model identifies three phases of cybercriminal behaviour and claims to help defenders better understand the root cause of attacks.
Cybercriminals are abusing Twitter via tech support scams, command-and-control operations and data exfiltration, cybersecurity researchers have shown.