From Zero Trust to total confidence
04 August, 2022 by Nam Lam, Country Manager, ANZ, SailPoint | Supplied by: SailPointIn today's business landscape, perimeter-based security is no longer sufficient.
Unity needed to address cyberthreats on ANZ businesses
03 August, 2022 | Supplied by: Fortinet Australia Pty LtdBusinesses across Australia and New Zealand continue to be targeted by cybercriminals as technology advances and attacks become increasingly sophisticated.
Claroty finds critical FileWave vulnerabilities
03 August, 2022 by Dylan Bushell-EmblingClaroty has uncovered two critical vulnerabilities in unpatched versions of the FileWave MDM suite that allow attackers to take over all devices managed by it.
One in three organisations attacked by malicious insiders
02 August, 2022More than one-third of organisations globally have suffered a ransomware attack by a malicious insider, according to a new report.
Employees fall for scam emails 'sent' by HR or IT
01 August, 2022Testing has found half of business phishing emails clicked contained subject lines related to HR or IT.
LinkedIn 'most faked' brand in phishing attempts
29 July, 2022A new report highlighting the brands most frequently imitated by cybercriminals has found that LinkedIn continues to hold the number one spot.
Sophos launches Sophos X-Ops unit
29 July, 2022 by Dylan Bushell-EmblingSophos's new Sophos X-Ops unit seeks to ramp up the fight against the cybercrime scourge by combining threat intelligence from three Sophos units.
Is Australia finally coming to grips with cybersecurity?
26 July, 2022 by Jason Duerden, Regional Director ANZThe appointment of Australia's first dedicated minister for cybersecurity highlights a trend that dates back to the beginning of this decade.
The silent killer: the threat costing more than ransomware
22 July, 2022 by John Karabin, director of cybersecurity at NTT Ltd Australia | Supplied by: NTT Ltd AustraliaWhile all eyes are on ransomware, a bigger threat may be weaving its way into everyday operations and going completely unnoticed.
Anatomy of a supply chain software attack
21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, Snyk | Supplied by: SnykThreat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.
Akamai uncovers sophisticated PayPal phishing scam
20 July, 2022 by Dylan Bushell-EmblingAttackers are using benign WordPress sites to execute a sophisticated PayPal phishing scam that seeks to collect a staggering amount of sensitive information.
New telco industry code targets scam SMSs
13 July, 2022 by Dylan Bushell-EmblingACMA has registered a new industry code developed with the Communications Alliance aimed at taking action against the growing threat of SMS scams.
Identifying blind spots: OT infrastructure vulnerability
13 July, 2022 by Dick Bussiere, Technical Director, APAC | Supplied by: Tenable APACAs OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.
Identity standards needed in the age of digital twins
07 July, 2022 by Nelson Petracek, CTO | Supplied by: Tibco Software Australia Pty LtdThe path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.
The data ransomware attackers are after
01 July, 2022 | Supplied by: Rapid7A new report released by Rapid7 investigates the double extortion trend pioneered by the Maze ransomware group.