Unit42 discloses severe flaw in Google's Gemini
13 March, 2026 by Dylan Bushell-Embling | Supplied by: Palo Alto NetworksResearchers from Palo Alto Networks' Unit 42 have detailed their discovery of a high-severity vulnerability in Google's Gemini Live in Chrome AI feature.
SentinelOne unveils identity security portfolio
11 March, 2026 by Dylan Bushell-Embling | Supplied by: SentinelOneSentinelOne has developed its security platform with capabilities aimed at safeguarding businesses against sophisticated identity-based attacks.
Bitdefender identifies new malware attack model
10 March, 2026 by Dylan Bushell-Embling | Supplied by: BitdefenderBitdefender researchers have identified an attack technique known as vibeware, which involves using AI to develop large volumes of malware in niche languages.
Genetec launches cloud-native physical security tool
05 March, 2026 by Dylan Bushell-Embling | Supplied by: Genetec Australia Pty LtdGenetec's Cloudlink 2210 has been designed to help enterprises complete complex deployments of cloud-managed physical security systems.
VAST Data partners with CrowdStrike to secure AI stack
04 March, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeVAST Data and CrowdStrike have partnered to bring threat detection and response capabilities to the environments where AI systems are built and operated.
Critical alert: exploitation of Cisco SD-WAN appliances
27 February, 2026The Australian Cyber Security Centre urges immediate action over a critical alert regarding an ongoing vulnerability in Cisco Catalyst SD-WAN appliances.
Tenable warns of supply chain attack on npm Registry
26 February, 2026 by Dylan Bushell-Embling | Supplied by: Tenable APACA malicious app added to the npm Registry had been downloaded around 50,000 times in the five hours before it was removed, according to Tenable Research.
ASD launches malware analysis tool on GitHub
25 February, 2026ASD says its new open-source tool, Azul, will allow oganisations to explore, analyse and correlate malware at scale.
Cloudflare adds post-quantum support to SASE platform
25 February, 2026 by Dylan Bushell-Embling | Supplied by: CloudflareCloudflare has progressed its mission of upgrading its product offerings to support post-quantum cryptography.
Akamai and NVIDIA develop OT security solution
24 February, 2026 by Dylan Bushell-Embling | Supplied by: Akamai TechnologiesAkamai and NVIDIA have jointly developed a solution for enabling zero trust security capabilities for operational technology and industrial control systems.
Why we need to redefine cybersecurity success to support CISOs
19 February, 2026 by Andrew Kay, APJ Director Systems Engineering, Illumio | Supplied by: IllumioWhen Notifiable Data Breaches statistics are released we should look at the nature of the breaches and how they were managed, rather than focus on the number of breaches.
Rubrik launches Rubrik Agent Cloud
19 February, 2026 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty LtdRubrik has launched into general availability a solution aimed at helping enterprises deploy AI agents without compromising on security or governance.
Is 2026 the year of identity? Just follow the money
18 February, 2026 by Chris Kelly* | Supplied by: DelineaWhat $40 billion in cyber acquisitions says about the future of identity security.
Check Point unveils AI security strategy
17 February, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies LtdCheck Point says it has developed a four-pillar strategy aimed at transforming its operations around helping organisations securely adopt AI.
Proactive cybersecurity must lead innovation in Australia’s AI future
16 February, 2026 by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis | Supplied by: ArmisAI presents extraordinary opportunities for productivity, innovation and growth but it also amplifies risk.
