Proofpoint completes acquisition of Tessian
08 January, 2024 by Dylan Bushell-EmblingProofpoint expects its acquisition of Tessian to allow the company to help organisations better safeguard themselves against the human layer of cyber risks.
ACSC flags critical vulnerabilities in Citrix products
20 November, 2023 by Dylan Bushell-EmblingThe ACSC has issued a critical vulnerability alert covering two Citrix software vulnerabilities exploited in this month's attack on port operator DP World.
Critical flaws in Atlassian product being exploited: ACSC
07 November, 2023 by Dylan Bushell-EmblingThe ACSC has warned it has received evidence that newly discovered critical vulnerabilities in a popular Atlassian product are being exploited in the wild.
Vulnerabilities found in Axis camera software
18 August, 2023 by Dylan Bushell-EmblingNozomi Networks has discovered and disclosed since-patched critical vulnerabilities in the Axis License Plate Verifier software product.
Are collaboration tools a security risk?
31 July, 2023A lack of security training on collaboration tools may be putting organisational security at risk, according to a new report from Mimecast.
HotRat malware has wideranging capabilities
26 July, 2023 by Dylan Bushell-EmblingAvast has discovered an advanced malware hidden in cracked software repositories which is capable of stealing login credentials and cryptocurrency wallets.
Building resilience: learnings from MOVEit
20 July, 2023 by Raghu Nandakumara, Head of Industry Solutions, illumioA mass attack has seen cybercriminals exploit a vulnerability in the MOVEit file transfer application... what went wrong?
Driving digital innovation with DevSecOps
20 July, 2023 by Adrian Smolski, Leader of Solutions Architecture team, Asia Pacific & Japan, GitLabIt's time to expand the scope of value stream mapping to provide a more holistic view of the advantages organisations deliver to their users and customers.
From phishing to deep fakes: weaponising social media
18 July, 2023 by Sean Duca, VP and Regional Chief Security Officer, Japan & Asia PacificSocial media increases an organisation's attack surface by displaying information that threat actors can use to execute social engineering techniques.
QuickBlox vulnerabilities uncovered
17 July, 2023 by Dylan Bushell-EmblingCheck Point Research and Claroty research arm Team82 have discovered and disclosed major vulnerabilities in the widely used QuickBlox collaboration platform.
The dark side of AI
13 July, 2023Cybersecurity specialists CMTG say the rapid adoption of AI is improving many aspects of everyday life, but the speed of innovation is presenting new risks.
Cybercriminals spoofing the financial sector
02 June, 2023 by Luke Power, ANZ Managing Director, TrellixThe financial services sector is a highly lucrative target, so it is no surprise that it's among the top industries targeted by cyber attacks.
Reduce the risk of accounts payable fraud
24 May, 2023 by Fabian Calle, managing director, small and medium business, SAP Concur ANZAs businesses integrate more flexible, technology-driven tools and processes, they also expose their operations to additional risks.
Interactive acquires Slipstream Cyber Security
24 March, 2023 by Dylan Bushell-EmblingAn Australian technology solutions provider is doubling down on security with the acquisition of partner Slipstream Cyber Security.
Successfully adopting a comprehensive DevSecOps solution
22 February, 2023 by Fytos Charalambides, Senior Director and Head of Technology, Australia and New Zealand, Red HatThe DevOps model combines software development and IT operations but leaves security isolated and is no longer robust enough to keep organisations safe.