Security for smart devices – time to step forward because there’s nowhere to hide
The seismic shift for security in smart devices isn’t coming – it’s here. From 4 March 2026, mandatory minimum security standards will apply to most…
The seismic shift for security in smart devices isn’t coming – it’s here. From 4 March 2026, mandatory minimum security standards will apply to most…
Attackers are exploiting a serious vulnerability in Cisco Catalyst software defined wide area network (SD-WAN) devices that enable them to bypass authentication. On top of…
Google disrupted a Chinese-linked hacking group that breached at least 53 organisations across 42 countries, the company said Wednesday. The hacking group, tracked as UNC2814…
At least 75 Australian businesses with a turnover of more than $3 million have admitted paying off ransomware groups in the first eight months of…
Artificial intelligence lab Anthropic has no intention of easing its usage restrictions for military purposes, a person familiar with the matter said, adding talks continue…
Peter Williams, the former general manager of United States defence contractor L3Harris’s cyber security arm Trenchant, was today sentenced to seven years and three months…
Telstra has stopped migrating its remote small cell mobile base stations onto low earth orbit satellites backhaul until its constellation provider, Eutelsat OneWeb, can get…
Australian logistics software firm WiseTech Global will lay off about 2000 people over the next two years as it adopts artificial intelligence across its software…
Commonwealth Bank will spend $90 million over the next three years to prepare its workforce of 30,000-plus staff for anticipated changes to roles, primarily due…
The federal government will undertake a comprehensive review of emergency calling legislation and rules “imminently” in a bid to restore public faith in Australia’s triple…
Superloop says that AI now handles most of its customer service, with the number of user interactions its agentic systems manage surpassing that handled by…
Showing that physical access to a device can spell “game over” for its security, a Canadian penetration tester has successfully demonstrated a string of attacks…