A different approach to hiring talent
25
Nov
2025

A different approach to hiring talent

Thank you for joining! Access your Pro+ Content below. 25 November 2025 Hacker for hire: A different approach to hiring…

Thoughts on Prompt Injection OPSEC
25
Nov
2025

Thoughts on Prompt Injection OPSEC

I want to respond to this blog post that’s arguing that prompt injection strings are essentially zero-days that we should…

How an AI meltdown could reset enterprise expectations
25
Nov
2025

How an AI meltdown could reset enterprise expectations

In this Help Net Security interview, Graham McMillan, CTO at Redgate Software, discusses AI, security, and the future of enterprise…

SitusAMC Data Breach Exposes Corporate Information
25
Nov
2025

SitusAMC Data Breach Exposes Corporate Information

SitusAMC, a major provider of back-end services for leading banks and lenders, has confirmed a SitusAMC data breach that resulted…

Aircraft cabin IoT leaves vendor and passenger data exposed
25
Nov
2025

Aircraft cabin IoT leaves vendor and passenger data exposed

The expansion of IoT devices in shared, multi-vendor environments, such as aircraft cabins, has created tension between the benefits of…

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
25
Nov
2025

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Nov 25, 2025Ravie LakshmananSpyware / Mobile Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert…

Google gives local cloud another undersea capacity boost
25
Nov
2025

Google gives local cloud another undersea capacity boost

Google plans to boost capacity for its Australian cloud offerings with an alternative undersea fibre cable route linking them into…

The breaches everyone gets hit by (and how to stop them)
25
Nov
2025

The breaches everyone gets hit by (and how to stop them)

Headlines scream about zero-days and nation-state attacks, but the reality is far less glamorous. Ross Haleliuk, from Venture in Security…

IC3 Impersonation Scams
25
Nov
2025

Rising IC3 Impersonation Scams Prompt Fresh FBI Alert

The FBI has issued a fresh alert warning the public about a growing wave of IC3 impersonation scams, where fraudsters…

Labor bets on agency to monitor AI companies
25
Nov
2025

Labor bets on agency to monitor AI companies

The Labor government is establishing a new agency that will help guide AI legislation and promote safe use of the…

Australia’s Boards Embrace AI, but Governance Gaps are Widening
25
Nov
2025

Australia’s Boards Embrace AI, but Governance Gaps are Widening

A new survey from the Diligent Institute, conducted with the Governance Institute of Australia (GIA) and the Singapore Institute of Directors (SID),…

Supply chain sprawl is rewriting security priorities
25
Nov
2025

Supply chain sprawl is rewriting security priorities

Organizations depend on long chains of vendors, but many cybersecurity professionals say these relationships create gaps they cannot see or…