Qld councils criticised for unresolved vulnerabilities – Security
Two-thirds of Queensland’s 77 councils have weaknesses in the security of their information systems. A review [pdf] of the sectors’ sustainability, risk management and controls…
Two-thirds of Queensland’s 77 councils have weaknesses in the security of their information systems. A review [pdf] of the sectors’ sustainability, risk management and controls…
The Australian Cyber Security Centre is warning Australian enterprises to immediately patch vulnerabilities in the Jenkins continuous integration/continuous deployment software that were first disclosed last…
The site of Telstra’s St Leonards exchange on Sydney’s lower north shore could be re-zoned to allow a $200 million-plus tower. The exchange, which houses…
German police have confiscated 50,000 bitcoin worth US$2.17 billion ($3.28 billion) in the country’s ‘most extensive’ cryptocurrency seizure ever, it said in a statement. “This…
Singtel said it was not looking to divest from its Optus unit, Australia’s second-largest wireless operator, refuting a report from the Australian Financial Review. AFR…
Australia needs to find affordable ways to make generative AI models available to university students, a house of representatives committee has heard. Carlo Iacono, Charles…
The government will put $50 million from its ‘better connectivity plan’ into improving mobile coverage on roads and highways. The Regional Roads Australia Mobile Program…
Popular source code management platform GitLab was patched on Friday, Australian time, against five vulnerabilities, including one with a critical severity rating. The patches apply…
Life insurer TAL Australia said its participation in a “cyber associates program” has given it immediate value, as well as a pipeline of future talent…
Students will become adept at “truth-spotting”, judging what’s important, and ethics, with the growing use of generative AI, an educator has told a parliamentary committee.…
The NSW Telco Authority is looking to fill a senior position, to take up the preparation of the authority’s cyber security technology roadmap. The authority…
Microsoft has identified how Russian attackers used rogue OAuth applications to breach its corporate email system, stealing messages and attachments. Last year, the NSA and…