In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and…
Microsoft Threat Intelligence analysts has shared new insights into North Korean and Chinese threat actors. At the recent CYBERWARCON, cybersecurity…
Cybercriminals have found a new way to exploit email security measures, turning them into tools for their malicious activities. Since…
As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the…
The Kali SOC in AWS project enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali…
A breach of telecoms companies that the United States said was linked to China was the “worst telecom hack in…
Chinese hackers are positioning themselves in US critical infrastructure IT networks for a potential clash with the United States, a…
A severe security vulnerability has been discovered in 7-Zip, the popular file compression utility, allowing remote attackers to execute malicious…
Technical debt refers to the inefficiencies and waste that arise when IT resources no longer meet an organisation’s needs. It can…
A boot camp run ahead of CyberCon this week aims to build future CISOs’ peer networks and business communication –…
TAFE NSW has disclosed the details of a $44.4 million ‘master contract’ awarded to Dell over two years ago. TAFE…
Australia’s government has dropped plans to fine internet platforms up to five percent of their global revenue for failing to…











