Security

Sophos launches Sophos X-Ops unit

29 July, 2022 by Dylan Bushell-Embling

Sophos's new Sophos X-Ops unit seeks to ramp up the fight against the cybercrime scourge by combining threat intelligence from three Sophos units.


Is Australia finally coming to grips with cybersecurity?

26 July, 2022 by Jason Duerden, Regional Director ANZ

The appointment of Australia's first dedicated minister for cybersecurity highlights a trend that dates back to the beginning of this decade.


The silent killer: the threat costing more than ransomware

22 July, 2022 by John Karabin, director of cybersecurity at NTT Ltd Australia | Supplied by: NTT Ltd Australia

While all eyes are on ransomware, a bigger threat may be weaving its way into everyday operations and going completely unnoticed.


Anatomy of a supply chain software attack

21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, Snyk | Supplied by: Snyk

Threat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.


Akamai uncovers sophisticated PayPal phishing scam

20 July, 2022 by Dylan Bushell-Embling

Attackers are using benign WordPress sites to execute a sophisticated PayPal phishing scam that seeks to collect a staggering amount of sensitive information.


New telco industry code targets scam SMSs

13 July, 2022 by Dylan Bushell-Embling

ACMA has registered a new industry code developed with the Communications Alliance aimed at taking action against the growing threat of SMS scams.


Identifying blind spots: OT infrastructure vulnerability

13 July, 2022 by Dick Bussiere, Technical Director, APAC | Supplied by: Tenable APAC

As OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.


Identity standards needed in the age of digital twins

07 July, 2022 by Nelson Petracek, CTO | Supplied by: Tibco Software Australia Pty Ltd

The path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.


The data ransomware attackers are after

01 July, 2022 | Supplied by: Rapid7

A new report released by Rapid7 investigates the double extortion trend pioneered by the Maze ransomware group.


Beefing up cyber defences during EOFY

30 June, 2022 by Chris Gibbs, Managing Director & Regional Vice President ANZ, Akamai

With cyber attacks expected to increase over the financial new year period, Chris Gibbs of Akamai offers the following advice.


Ransomware-as-a-service industry now exceeds $1bn: Tenable

30 June, 2022 by Dylan Bushell-Embling

The emergence of the successful double extortion technique is fuelling rapid growth in the ransomware industry, with groups raking in over $1bn in 2020 alone.


New tool makes websites more secure

27 June, 2022

An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyber attacks.


Proofpoint warns of "dangerous" Microsoft 365 function

23 June, 2022 by Dylan Bushell-Embling

Proofpoint has discovered a method of exploiting a function within Microsoft 365 that could allow attackers to ransom files stored on SharePoint and OneDrive.


Lookout blows whistle on Kazakhstan's use of malware

22 June, 2022 by Dylan Bushell-Embling

Security researchers from Lookout have found evidence of the Government of Kazakhstan using a sophisticated spyware likely purchased by a malware vendor.


Schneider, Claroty launch building security tool

22 June, 2022 by Dylan Bushell-Embling

Schneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd