Swinburne University of Technology seeks new CIO – Strategy – Training & Development
Swinburne University of Technology is looking for a chief information officer (CIO). The position description [pdf] states the CIO reports to COO Nancy Collins and…
Swinburne University of Technology is looking for a chief information officer (CIO). The position description [pdf] states the CIO reports to COO Nancy Collins and…
Johnson Controls International has suffered what is described as a massive ransomware attack that encrypted many of the company devices, including VMware ESXi servers, impacting…
The proof-of-concept (PoC) attack code for a major vulnerability known as CVE-2023-29357 has been made public. This vulnerability allows users to get elevated privileges in…
SoundThinking, the company behind the gunshot-detection system ShotSpotter, is quietly acquiring staff, patents, and customers of the firm that created the notorious predictive policing software…
If you’ve installed Bitwarden Password Manager recently, ensure that you downloaded it from its official website and not from a fraudulent, malicious source. ZenRAT malware…
Microsoft’s new AI image generation Paint tool powered by OpenAI’s DALL-E text-to-image model is now rolling out to Windows Insiders in Dev and Canary channels.…
Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly…
According to the application security provider Checkmarx, cybercriminals concealed malicious code, masquerading as Dependabot, within GitHub repositories as part of a supply chain attack. Cybersecurity…
Five more subpostmaster victims of the Post Office Horizon IT scandal have had wrongful criminal convictions overturned. A total of 91 former subpostmasters and Post…
A Chinese state-sponsored APT called BlackTech has been caught hacking into network edge devices and using firmware implants to stay hidden and silently hop around…
A remote control malware called Gh0st RAT, which is popular with Chinese threat actors and has publicly available source code was created by China’s C.…
Sep 27, 2023THNMalware / Cyber Attack A new threat actor known as AtlasCross has been observed leveraging Red Cross-themed phishing lures to deliver two previously…