This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. OpenAEV: Open-source…
Most hackers spend more time learning, testing, and comparing notes than breaking into systems. The work often happens alone or…
Australian businesses are now facing significantly more network-based attacks than traditional malware, according to WatchGuard Technologies’ Q4 2025 Threat Landscape…
Researchers have unveiled a new approach to powering quantum computers using quantum batteries, a development that could significantly improve the…
Services Australia has agreed to document the business rules used by its 40-year-old mainframe-based core system to calculate aged pension…
ISACA’s newly released State of Privacy 2026 survey warns that privacy teams across Oceania are under increasing pressure as resources shrink and…
Woolworths Group has moved to fill an impending gap in its board’s technology leadership credentials, created by the departure of…
The CyberArk Labs team have identified Apache bRPC users are exposed to a critical command injection flaw in the /pprof/heap…
The acting director of the Cybersecurity and Infrastructure Security Agency (CISA) uploaded sensitive contracting documents marked “for official use only”…
Dragos has released a detailed threat intelligence report providing the first in-depth operational technology (OT) security analysis of the 29…
Rapid7 has appointed Simon Ractliffe (pictured) as General Manager for its Asia Pacific and Japan (APJ) business, strengthening regional leadership…
ESET researchers have identified an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan. The operation…