LinkedIn 'most faked' brand in phishing attempts
29 July, 2022A new report highlighting the brands most frequently imitated by cybercriminals has found that LinkedIn continues to hold the number one spot.
Sophos launches Sophos X-Ops unit
29 July, 2022 by Dylan Bushell-EmblingSophos's new Sophos X-Ops unit seeks to ramp up the fight against the cybercrime scourge by combining threat intelligence from three Sophos units.
Is Australia finally coming to grips with cybersecurity?
26 July, 2022 by Jason Duerden, Regional Director ANZThe appointment of Australia's first dedicated minister for cybersecurity highlights a trend that dates back to the beginning of this decade.
The silent killer: the threat costing more than ransomware
22 July, 2022 by John Karabin, director of cybersecurity at NTT Ltd Australia | Supplied by: NTT Ltd AustraliaWhile all eyes are on ransomware, a bigger threat may be weaving its way into everyday operations and going completely unnoticed.
Anatomy of a supply chain software attack
21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, Snyk | Supplied by: SnykThreat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.
Akamai uncovers sophisticated PayPal phishing scam
20 July, 2022 by Dylan Bushell-EmblingAttackers are using benign WordPress sites to execute a sophisticated PayPal phishing scam that seeks to collect a staggering amount of sensitive information.
New telco industry code targets scam SMSs
13 July, 2022 by Dylan Bushell-EmblingACMA has registered a new industry code developed with the Communications Alliance aimed at taking action against the growing threat of SMS scams.
Identifying blind spots: OT infrastructure vulnerability
13 July, 2022 by Dick Bussiere, Technical Director, APAC | Supplied by: Tenable APACAs OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.
Identity standards needed in the age of digital twins
07 July, 2022 by Nelson Petracek, CTO | Supplied by: Tibco Software Australia Pty LtdThe path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.
The data ransomware attackers are after
01 July, 2022 | Supplied by: Rapid7A new report released by Rapid7 investigates the double extortion trend pioneered by the Maze ransomware group.
Ransomware-as-a-service industry now exceeds $1bn: Tenable
30 June, 2022 by Dylan Bushell-EmblingThe emergence of the successful double extortion technique is fuelling rapid growth in the ransomware industry, with groups raking in over $1bn in 2020 alone.
Beefing up cyber defences during EOFY
30 June, 2022 by Chris Gibbs, Managing Director & Regional Vice President ANZ, AkamaiWith cyber attacks expected to increase over the financial new year period, Chris Gibbs of Akamai offers the following advice.
New tool makes websites more secure
27 June, 2022An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyber attacks.
Proofpoint warns of "dangerous" Microsoft 365 function
23 June, 2022 by Dylan Bushell-EmblingProofpoint has discovered a method of exploiting a function within Microsoft 365 that could allow attackers to ransom files stored on SharePoint and OneDrive.
Schneider, Claroty launch building security tool
22 June, 2022 by Dylan Bushell-EmblingSchneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.