Government will miss cyber resiliency targets, MPs warn
11
Jun
2025

London Tech Week: More funding, fellowships and skills

The government has opened up applications for the second round of its Venture Capital Fellowship career development programme for investment…

Adopting Trustworthy AI and Governance for business success amidst the AI hype
11
Jun
2025

Adopting Trustworthy AI and Governance for business success amidst the AI hype

Twenty years ago, could anyone have predicted that we would be relying on artificial intelligence (AI) to make critical business…

Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable
11
Jun
2025

Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable

A critical vulnerability (CVE-2025-4275) in Insyde H2O UEFI firmware allows attackers to bypass Secure Boot protections by injecting malicious digital…

The path to better cybersecurity isn’t more data, it’s less noise
11
Jun
2025

The path to better cybersecurity isn’t more data, it’s less noise

In cybersecurity, there’s an urge to collect as much data as possible. Logs, alerts, metrics, everything. But more data doesn’t…

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment
11
Jun
2025

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment

OWASP Nettacker is a free, open-source tool designed for network scanning, information gathering, and basic vulnerability assessment. Built and maintained…

End of the Road for the Australian Cyber Network
11
Jun
2025

End of the Road for the Australian Cyber Network

The board of directors have announced the winding up of the Australian Cyber Network. The ACN was established to serve…

How to build AI into your business without breaking compliance
11
Jun
2025

How to build AI into your business without breaking compliance

AI is supposed to make businesses faster, smarter, and more competitive, but most projects fall short. The Cloud Security Alliance…

AI forces IT leaders to rethink their network strategies
11
Jun
2025

AI forces IT leaders to rethink their network strategies

As AI assistants, agents, and data-driven workloads reshape how work gets done, they’re creating more latency-sensitive, and more complex network…

A New Social Contract for the Age of AI: Who Owns Our Data?
11
Jun
2025

A New Social Contract for the Age of AI: Who Owns Our Data?

In the age of rapidly advancing artificial intelligence, where powerful algorithms can predict human behaviour and model global patterns, we…

SentinelOne Announces 2025 APJ PartnerOne Award Winners
11
Jun
2025

SentinelOne Announces 2025 APJ PartnerOne Award Winners

SentinelOne has announced the Australian winners of its 2025 APJ PartnerOne Awards, recognising their outstanding contributions to innovation in security…

Patch Tuesday, April 2025 Edition – Krebs on Security
11
Jun
2025

Patch Tuesday, June 2025 Edition – Krebs on Security

Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns…

Apple Intelligence Is Gambling on Privacy as a Killer Feature
11
Jun
2025

Apple Intelligence Is Gambling on Privacy as a Killer Feature

As Apple’s Worldwide Developers Conference keynote concluded on Monday, market watchers couldn’t help but notice that the company’s stock price was…