Security

Anatomy of a supply chain software attack

21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, Snyk | Supplied by: Snyk

Threat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.


Akamai uncovers sophisticated PayPal phishing scam

20 July, 2022 by Dylan Bushell-Embling

Attackers are using benign WordPress sites to execute a sophisticated PayPal phishing scam that seeks to collect a staggering amount of sensitive information.


Identifying blind spots: OT infrastructure vulnerability

13 July, 2022 by Dick Bussiere, Technical Director, APAC | Supplied by: Tenable APAC

As OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.


New telco industry code targets scam SMSs

13 July, 2022 by Dylan Bushell-Embling

ACMA has registered a new industry code developed with the Communications Alliance aimed at taking action against the growing threat of SMS scams.


Identity standards needed in the age of digital twins

07 July, 2022 by Nelson Petracek, CTO | Supplied by: Tibco Software Australia Pty Ltd

The path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.


The data ransomware attackers are after

01 July, 2022 | Supplied by: Rapid7

A new report released by Rapid7 investigates the double extortion trend pioneered by the Maze ransomware group.


Ransomware-as-a-service industry now exceeds $1bn: Tenable

30 June, 2022 by Dylan Bushell-Embling

The emergence of the successful double extortion technique is fuelling rapid growth in the ransomware industry, with groups raking in over $1bn in 2020 alone.


Beefing up cyber defences during EOFY

30 June, 2022 by Chris Gibbs, Managing Director & Regional Vice President ANZ, Akamai

With cyber attacks expected to increase over the financial new year period, Chris Gibbs of Akamai offers the following advice.


New tool makes websites more secure

27 June, 2022

An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyber attacks.


Proofpoint warns of "dangerous" Microsoft 365 function

23 June, 2022 by Dylan Bushell-Embling

Proofpoint has discovered a method of exploiting a function within Microsoft 365 that could allow attackers to ransom files stored on SharePoint and OneDrive.


Schneider, Claroty launch building security tool

22 June, 2022 by Dylan Bushell-Embling

Schneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.


Lookout blows whistle on Kazakhstan's use of malware

22 June, 2022 by Dylan Bushell-Embling

Security researchers from Lookout have found evidence of the Government of Kazakhstan using a sophisticated spyware likely purchased by a malware vendor.


Microsoft patches Follina vulnerability

17 June, 2022 by Dylan Bushell-Embling

Microsoft's latest Patch Tuesday releases patch 61 unique vulnerabilities, including the high-profile and actively exploited Follina vulnerability.


Phishers targeting mainstream interest in crypto

17 June, 2022 by Dylan Bushell-Embling

Cybercriminals are adapting their phishing campaigns and malware to take advantage of the growing interest in cryptocurrency and NFCs, according to Proofpoint.


Fortinet appoints new head of OT and CI

17 June, 2022

Fortinet has appointed Michael Murphy as head of operational technology and critical infrastructure for Australia.


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd