Critical alert: exploitation of Cisco SD-WAN appliances
27 February, 2026The Australian Cyber Security Centre urges immediate action over a critical alert regarding an ongoing vulnerability in Cisco Catalyst SD-WAN appliances.
Tenable warns of supply chain attack on npm Registry
26 February, 2026 by Dylan Bushell-Embling | Supplied by: Tenable APACA malicious app added to the npm Registry had been downloaded around 50,000 times in the five hours before it was removed, according to Tenable Research.
ASD launches malware analysis tool on GitHub
25 February, 2026ASD says its new open-source tool, Azul, will allow oganisations to explore, analyse and correlate malware at scale.
Cloudflare adds post-quantum support to SASE platform
25 February, 2026 by Dylan Bushell-Embling | Supplied by: CloudflareCloudflare has progressed its mission of upgrading its product offerings to support post-quantum cryptography.
Akamai and NVIDIA develop OT security solution
24 February, 2026 by Dylan Bushell-Embling | Supplied by: Akamai TechnologiesAkamai and NVIDIA have jointly developed a solution for enabling zero trust security capabilities for operational technology and industrial control systems.
Why we need to redefine cybersecurity success to support CISOs
19 February, 2026 by Andrew Kay, APJ Director Systems Engineering, Illumio | Supplied by: IllumioWhen Notifiable Data Breaches statistics are released we should look at the nature of the breaches and how they were managed, rather than focus on the number of breaches.
Rubrik launches Rubrik Agent Cloud
19 February, 2026 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty LtdRubrik has launched into general availability a solution aimed at helping enterprises deploy AI agents without compromising on security or governance.
Is 2026 the year of identity? Just follow the money
18 February, 2026 by Chris Kelly* | Supplied by: DelineaWhat $40 billion in cyber acquisitions says about the future of identity security.
Check Point unveils AI security strategy
17 February, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies LtdCheck Point says it has developed a four-pillar strategy aimed at transforming its operations around helping organisations securely adopt AI.
Proactive cybersecurity must lead innovation in Australia’s AI future
16 February, 2026 by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis | Supplied by: ArmisAI presents extraordinary opportunities for productivity, innovation and growth but it also amplifies risk.
Palo Alto completes CyberArk acquisition
13 February, 2026 | Supplied by: Palo Alto NetworksPalo Alto has completed the acquisition of identity security company CyberArk, establishing identity security as a core pillar of its platform strategy.
RCE vulnerability discovered in Microsoft Power BI
12 February, 2026 | Supplied by: The Missing LinkThe Missing Link has announced the disclosure of CVE-2026-21229, a Power BI Remote Code Execution (RCE) vulnerability.
Australia's biggest cyber breaches aren't hacks, they're access failures
09 February, 2026 by Ben Mudie, Field CTO for APJ, Tenable | Supplied by: Tenable APACThe largest cyber breaches have rarely been sophisticated and were often preventable.
CrowdStrike achieves ISO certification for AI security
28 January, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeCrowdStrike has achieved ISO 42001 certification, validating its approach to responsible AI-powered cybersecurity practices.
Check Point establishes Auckland PoP
23 January, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies LtdCheck Point has expanded its presence in New Zealand with the launch of a local data residency instance of its Check Point Harmony SASE suite.
