ACCC to allow cross-banking collaboration on scam prevention
03
Aug
2023

ACCC to allow cross-banking collaboration on scam prevention – Finance – Strategy

The ACCC has authorised the Australian Banking Association (ABA) and its members to share insights and develop an industry standard…

03
Aug
2023

Assess multi-cloud security with the open-source CNAPPgoat project

Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in…

03
Aug
2023

SCARF cipher sets new standards in protecting sensitive data

A group of international researchers has achieved a breakthrough in computer security by developing a new and highly efficient cipher…

NSW sees need for a 'PEXA' for election tech nationally
03
Aug
2023

NSW sees need for a ‘PEXA’ for election tech nationally – Software

The NSW government wants to see a “common national election technology system” created, potentially using a model similar to PEXA,…

Ivanti patches second zero-day vulnerability being used in attacks
03
Aug
2023

Ivanti patches second zero-day vulnerability being used in attacks

Ivanti has issued a patch to address a second critical zero-day vulnerability that is under active attack. The vulnerability is said…

Australian Unity elevates data focus with new GM role
03
Aug
2023

Australian Unity elevates data focus with new GM role – Strategy – Training & Development

Australian Unity is bringing Bupa’s director of data technology Craig Rowlands into a newly-created general manager of enterprise data role….

Players and servers at risk from BleedingPipe vulnerability
03
Aug
2023

Players and servers at risk from BleedingPipe vulnerability

Minecraft players interested in modding are at risk from a remote code execution vulnerability targeting both players and servers. Minecraft…

Ivanti endpoint security needs security upgrade
03
Aug
2023

Ivanti endpoint security needs security upgrade – Security

Ivanti, which last week had to move on a vulnerability in its Endpoint Manager Mobile (EMM) product, has disclosed a…

How to use AWS SSM agent as backdoor and hack into EC2 instances?
03
Aug
2023

How to use AWS SSM agent as backdoor and hack into EC2 instances?

Amazon Web Services (AWS) has a novel post-exploitation approach that has been identified by researchers. This technique enables hackers to…

Salesforce email compromised for phishing attacks
02
Aug
2023

Salesforce email compromised for phishing attacks – Security – Cloud

Salesforce has patched a vulnerability in its email services that researchers discovered was being exploited in targeted phishing attacks against…

US House panel opens probe into email system hacks
02
Aug
2023

US House panel opens probe into email system hacks – Security

The US House of Representatives Oversight Committee is opening an investigation into China’s suspected involvement in recent breaches of Commerce…

Flipper Zero
02
Aug
2023

Fake FlipperZero sites promise free devices after completing offer

A site impersonating Flipper Devices promises a free Flipper Zero after completing an offer but only leads to shady browser…