Bridging the cybersecurity skills gap through cyber range training
In this Help Net Security interview, Debbie Gordon, CEO of Cloud Range explains the concept of a cyber range, its crucial role in preparing for…
In this Help Net Security interview, Debbie Gordon, CEO of Cloud Range explains the concept of a cyber range, its crucial role in preparing for…
Atlassian last Friday announced fixes for three remote code execution (RCE) vulnerabilities. The three bugs are rated as high rather than critical severity, since they’re…
Fraudsters are opportunistic criminals and 2022 and the first few months of this year brought opportunities like never before, according to Experian. This volatility perpetuated…
Yancoal Australia has deployed a private mobile network to its Mt Thorley Warkworth operations in the NSW Hunter Valley region, bolstering its ability to track…
Home Affairs has extended a merchant services agreement with PayPal Australia while also now disclosing financial details of the arrangement, seven years after the first…
AI companies including OpenAI, Alphabet and Meta Platforms have made voluntary commitments to the US White House to implement measures such as watermarking AI-generated content…
As Microsoft prepares for the imminent rollout of Windows 11 23H2, they’ve been developing various innovative features designed to improve user experience, streamline workflows, and…
Vocus’ 1000km Darwin cable has gone live, giving the city a connection to the company’s North West Cable System (NWCS). The activation of the $100…
VirusTotal maintains that the data exposure was a consequence of human error and that no malicious actors were involved in the incident. VirusTotal, the threat…
The Clop ransomware gang is copying an ALPHV ransomware gang extortion tactic by creating Internet-accessible websites dedicated to specific victims, making it easier to leak…
Thousands of Citrix Netscaler ADC and Gateway servers exposed online are likely vulnerable against a critical remote code execution (RCE) bug exploited by unauthenticated attackers…
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository invitations…