The Hidden Costs of Endpoint Chaos (And How to Fix It)
No modern IT expert would recommend forgoing antivirus, endpoint detection and response or backup. And yet, many Australian organisations find themselves inadvertently falling into this…
No modern IT expert would recommend forgoing antivirus, endpoint detection and response or backup. And yet, many Australian organisations find themselves inadvertently falling into this…
Security teams are leaning hard into AI, and fast. A recent survey of 500 senior cybersecurity pros at big U.S. companies found that 86% have…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its…
As Australian organisations accelerate digital transformation and AI reshapes the fabric of enterprise operations, Australia faces a pivotal moment in its cyber maturity. Identity security…
Sensata Technologies, Inc., a prominent industrial technology company based in Attleboro, Massachusetts, has disclosed a significant cybersecurity incident that compromised the personal information of hundreds…
A critical security vulnerability has been discovered in ManageEngine Exchange Reporter Plus, a popular email monitoring and reporting solution, that could allow attackers to execute…
At Span Cyber Security Arena, I sat down with Iva Mišković, Partner at the ISO-certified Mišković & Mišković law firm, to discuss the role of…
The federal Department of Health, Disability and Ageing has signed a $33 million deal with Optus for a managed network-as-a-service offering. Under the three-year contract,…
A security researcher has disclosed a critical vulnerability in Google’s account recovery system that allowed attackers to brute-force and obtain the phone numbers of any…
In this Help Net Security video, Eoin Wickens, Director of Threat Intelligence at HiddenLayer, explores the security risks posed by agentic AI. He breaks down…
AI adoption is increasing, with 84% of organizations now using AI in the cloud, according to Orca Security. But this innovation comes with new risks:…
A critical security vulnerability in Google’s account recovery system allowed malicious actors to obtain the phone numbers of any Google user through a sophisticated brute-force…