Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines
04
Aug
2025

Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines

The cybersecurity landscape continues to evolve as threat actors develop increasingly sophisticated methods to compromise Windows systems. A new ransomware…

Critical Squid Flaw Allows Remote Code Execution by Attackers
04
Aug
2025

Critical Squid Flaw Allows Remote Code Execution by Attackers

A severe security vulnerability in the widely-used Squid HTTP proxy has been disclosed, potentially exposing millions of systems to remote…

AIBOMs are the new SBOMs: The missing link in AI risk management
04
Aug
2025

AIBOMs are the new SBOMs: The missing link in AI risk management

In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training…

Shadow AI risks proliferate - Australian Cyber Security Magazine
04
Aug
2025

Shadow AI risks proliferate – Australian Cyber Security Magazine

Netskope has released new research showing a 50% spike in genAI platform usage among enterprise end-users in the three months…

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution
04
Aug
2025

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution

Cybersecurity researchers at Aim Labs have discovered a critical vulnerability in the popular AI-powered Cursor IDE that enables attackers to…

Average global data breach cost now $4.44 million
04
Aug
2025

Average global data breach cost now $4.44 million

IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance….

How Azure Landing Zones can set the structure for cloud success
04
Aug
2025

How Azure Landing Zones can set the structure for cloud success

Cloud success isn’t defined by what you can deploy, but by what you can operate, govern, and grow, with confidence,…

Free Assessment Tool to Navigate Child Safety Age Assurance Compliance
04
Aug
2025

Free Assessment Tool to Navigate Child Safety Age Assurance Compliance

AU10TIX has launched a free Child Safety Age Assurance Risk and Readiness Assessment and Age Assurance Readiness Guide designed to…

Open-source password recovery utility Hashcat 7.0.0 released
04
Aug
2025

Open-source password recovery utility Hashcat 7.0.0 released

Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms….

What's keeping risk leaders up at night? AI, tariffs, and cost cuts
04
Aug
2025

What’s keeping risk leaders up at night? AI, tariffs, and cost cuts

Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according…

Meta to share AI infrastructure costs via US$2 billion asset sale
04
Aug
2025

Meta to share AI infrastructure costs via US$2 billion asset sale

Meta Platforms is pressing ahead with efforts to bring in outside partners to help fund the massive infrastructure needed to…

How change management helped NT Police rescue delayed SerPro launch
04
Aug
2025

How change management helped NT Police rescue delayed SerPro launch

The Northern Territory Police Force has adopted a top-down change management strategy to oversee the delivery of technology and transformation…