Overlooking platform security weakens long-term cybersecurity posture
Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according…
Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according…
Security researchers have uncovered several high-severity vulnerabilities in the popular Mullvad VPN service that could allow attackers to execute malicious code and compromise user privacy.…
Lotterywest is recruiting for new security leadership to oversee its “highly integrated” cyber systems and practices. The Western Australia’s lotteries commission’s cyber security was previously…
Queensland’s chief customer and digital officer of nearly three years Chris McLaren will step down at the end of this week, as a machinery-of-government change…
The cloud offers unprecented opportunities for business optimisation, and opens doors to new technologies that would otherwise be difficult or impossible to implement. Yet without…
The Chinese Winnti hacking group is using a new PHP backdoor named ‘Glutton’ in attacks on organizations in China and the U.S., and also in…
The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and…
Resecurity unveils AI-powered GSOC at NATO Edge 2024, integrating VR for advanced cybersecurity. Tailored for MSSPs, it enhances threat detection, response, and collaboration globally. Resecurity,…
In its latest jab at Beijing, the US will empower companies like Google and Microsoft to act as gatekeepers worldwide for highly sought-after access to…
The New Zealand government will pass legislation next year to prevent entities that “do not share the country’s values” from using it as a base…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes exploited zero-day (CVE-2024-49138)On December 2024 Patch Tuesday, Microsoft…
PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms Pierluigi Paganini December 15, 2024 Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating…