Smart helmet tech points to the future of fighting audio deepfakes
Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate a person’s voice with matching…
Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate a person’s voice with matching…
The Australian Communications and Media Authority (ACMA) has accused carriers of taking a weak stance when it comes to safeguarding the interests of Australian telecommunications…
The Bitter APT group, also tracked as APT-Q-37 and known in China as 蔓灵花, has launched a sophisticated cyberespionage campaign targeting government agencies, military installations,…
The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on Windows systems, challenging traditional endpoint…
AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with a price. A new report…
SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted…
SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted…
Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout and Rubrik. Axoflow Security Data…
A new technique allows hackers to extract encrypted authentication tokens from Microsoft Teams on Windows, enabling unauthorized access to chats, emails, and SharePoint files. In…
Telstra has completed one-third of the rollout of a new national fibre network that it is now branding as ‘Aura’. Telstra CEO and Managing Director Vicki…
The rapid adoption of generative and agentic artificial intelligence (AI), cloud computing and edge computing is transforming the digital landscape while introducing unprecedented cybersecurity complexity.…
Australian users of about 70 dated Samsung handsets face being cut off from mobile service due to problems with their devices’ firmware, which exclusively attempts…