AI coding threatens to make common security flaw more prevalent
05
Aug
2025

AI coding threatens to make common security flaw more prevalent

The use of artificial intelligence for development is threatening to make a specific type of web application flaw, insecure direct object…

Australian Appointed Vice Chair of ISACA Global Board
05
Aug
2025

Australian Appointed Vice Chair of ISACA Global Board

ISACA has announced the appointment of Australian cybersecurity expert Jamie Norton (pictured) as Vice Chair of its 2025–2026 Board of…

Google publishes 20 new vulnerabilities found by its Big Sleep AI
05
Aug
2025

Google publishes 20 new vulnerabilities found by its Big Sleep AI

Google’s Gemini artificial intelligence-powered Big Sleep system has found further vulnerabilities in popular software, as part of the company’s push…

Print Friendly, PDF & Email
05
Aug
2025

Artificial Intelligence in Action w/ prof. Ahmed Banafa

We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World…

Bendigo Bank acting CIO announces departure
05
Aug
2025

Bendigo Bank acting CIO announces departure

Bendigo and Adelaide Bank acting chief information officer Nathalie Moss has announced her exit from the company after a year…

05
Aug
2025

Artificial Intelligence in Action w/ prof. Ahmed Banafa

We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World…

NBN Co signs on to Amazon's Project Kuiper as Sky Muster replacement
05
Aug
2025

NBN Co signs on to Amazon’s Project Kuiper as Sky Muster replacement

NBN Co will offer users in its Sky Muster footprint an upgrade path to low earth orbit satellite services powered…

How AI is Reinventing the Security Operations Center
05
Aug
2025

How AI is Reinventing the Security Operations Center

The typical SOC team can be presented with thousands of security alerts every day. While most turn out to be…

How Artificial Intelligence Is Shaping the Future of Cyber Threat Detection
05
Aug
2025

How Artificial Intelligence Is Shaping the Future of Cyber Threat Detection

Hackers are constantly evolving their strategies to outsmart traditional security measures, even through the use of AI. In response, AI-driven…

New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems
05
Aug
2025

New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems

The investigation began with the detection of two scanning IP addresses, 91.238.181[.]225 and 5.188.86[.]169 sharing a common Secure Shell (SSH)…

Delta Air assures US lawmakers it will not personalise fares using AI
05
Aug
2025

Delta Air assures US lawmakers it will not personalise fares using AI

Delta Air Lines has said it will not use artificial intelligence to set personalised ticket prices for passengers after facing…

How Rugged Equipment Improves Cybersecurity
05
Aug
2025

How Rugged Equipment Improves Cybersecurity

Rugged devices are tough, purpose-built hardware that operate in harsh environments — such as jobsites with heavy dust or constant…