State-backed APT groups are targeting Australia's health sector for COVID-19 research and taking advantage of the crisis in their phishing campaigns.
The DTA has released the source code behind the COVIDSafe contact tracing app on a GitHub repository for public review.
Researchers have uncovered a sophisticated attack campaign linked to the Chinese military targeting APAC government agencies including the WA Premier's office.
Less than half of tech professsionals surveyed by ISACA are "highly confident" in their ability to detect or mitigate threats.
The National Committee of data management peak body DAMA Australia and ICT advocacy group The Pearcey Foundation have both endorsed the COVID-19 tracing app.
The subdomain takeover vulnerability could cause widespread financial damage or data leakage.
The ACCC has strongly endorsed the use of the federal government's COVID-19 tracing app after vetting the technology used to maintain user privacy.
Important safeguards are in place to ensure the app protects our data, says Angelene Faulk.
The majority of security pro respondents to a survey from Attivo Networks said attackers are dwelling inside their compromised networks for at least 100 days.
The Australian Cyber Security Centre has warned of new scams, frauds and phishing campaigns, all with a COVID-19 theme.
Electronic Frontiers Australia wants the federal government to start talking to technologists, rights advocates and the public about its COVID-19 tracing app.
Its research uncovers a decade-long APT campaign on Linux servers, Microsoft and Android, which it says have all been conducted in the interests of the Chinese government.
Cybercriminals have incorporated COVID-19 themes into more than 80% of their email attack campaigns, according to research from Proofpoint.
Microsoft has discovered two remote code execution vulnerabilities in unpatched versions of the Adobe Type Manager Library for Windows 7.
The popularity of streaming services such as Netflix, Disney+ and Apple Music has created a lucrative new market for attackers able to steal login details.