Author: Cybernoz

Staggering cost of outages to businesses
18
Sep
2025

Staggering cost of outages to businesses

New Relic has released its 2025 Observability Forecast, surveying over 1,700 IT and engineering leaders and team members across 23…

Global hiring risks: What you need to know about identity fraud and screening trends
18
Sep
2025

Global hiring risks: What you need to know about identity fraud and screening trends

Hiring new employees has always carried some risk, but that risk is growing in new ways, and identity fraud is…

Actor auth tokens gave Global Admin access across Azure Entra ID tenants
18
Sep
2025

Actor auth tokens gave Global Admin access across Azure Entra ID tenants

A Dutch security researcher has published an indepth analysis of a critical vulnerability that could have allowed attackers to compromise…

C-Suite Survey Reveals Software Innovation driving revenue
18
Sep
2025

C-Suite Survey Reveals Software Innovation driving revenue

GitLab Inc has released its 2025 executive research report, The Economics of Software Innovation: AUD$6B Opportunity at a Crossroads. Conducted…

Kmart Australia's use of facial recognition breached privacy
18
Sep
2025

Kmart Australia’s use of facial recognition breached privacy

Kmart Australia breached the privacy of potentially “hundreds of thousands” of individuals when it used a facial recognition technology system…

Data Sovereignty Emerges as Critical Business Risk
18
Sep
2025

Data Sovereignty Emerges as Critical Business Risk

Pure Storage has released new insights on data sovereignty in collaboration with the University of Technology Sydney (UTS). The analysis…

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild
18
Sep
2025

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild

Google has released an emergency security update for its Chrome web browser to address a high-severity zero-day vulnerability that is…

China’s annual security and defence dialogue, the Xiangshan Forum, opened on Thursday. Photo: AP
18
Sep
2025

Takeaways from Chinese Defence Minister Dong Jun’s speech at Xiangshan Forum

During his 30-minute keynote speech Dong addressed key issues, including Taiwan, the South China Sea and China’s take on regional…

Podcast: Data sovereignty and what you need to do about it
18
Sep
2025

Podcast: Data sovereignty and what you need to do about it

In this podcast, we ask Patrick Smith, EMEA chief technology officer at Pure Storage, about the increased drive towards ensuring…

Heightened global risk pushes interest in data sovereignty
18
Sep
2025

Heightened global risk pushes interest in data sovereignty

Heightened risk related to data sovereignty is universally acknowledged. Most IT decision makers see that risk increasing as a result…

18
Sep
2025

NSW gov third party-linked cyber incidents quadruple in two years

Cyber incidents linked to third-party systems used by the NSW government have more than quadrupled over the past two years,…

China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications
18
Sep
2025

China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications

The Chinese state-sponsored threat actor TA415 has evolved its tactics, techniques, and procedures by leveraging legitimate cloud services like Google…