IBM aims for quantum computer in 2029
10
Oct
2025

Qld lifts 12-year ban on IBM after $1.25bn payroll failure

The Queensland government has lifted its ban on contracting with IBM, more than a decade after it was imposed following…

New infosec products of the week: October 10, 2025
10
Oct
2025

New infosec products of the week: October 10, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Object First, OPSWAT, Radiflow, and…

10
Oct
2025

Cadence, culture, and clarity: making OKRs a living framework

Dean Swan, Vice President and General Manager of monday.com in APJ, says that’s what separates organisations who treat OKRs as…

7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code
10
Oct
2025

7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code

Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to execute…

Social Media Minimum Age obligation guidance
10
Oct
2025

Social Media Minimum Age obligation guidance

The Office of the Australian Information Commissioner (OAIC) has published regulatory guidance for age-restricted social media platforms and age assurance…

Macquarie Bank on board with Google Gemini
10
Oct
2025

Macquarie Bank on board with Google Gemini

Macquarie Bank is the first major Australian bank to publicly reveal its plans to adopt Google’s newly-launched business AI offering,…

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies
10
Oct
2025

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies

The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and responsibilities of…

ERMAC Android malware source code leak exposes banking trojan infrastructure
10
Oct
2025

New Android spyware ClayRat imitates WhatsApp, TikTok, YouTube

A new Android spyware called ClayRat is luring potential victims by posing as popular apps and services like WhatsApp, Google…

Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access
10
Oct
2025

Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access

Over the past two months, threat actors have weaponized a critical authentication bypass flaw in the Service Finder Bookings WordPress…

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025
10
Oct
2025

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025

There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven…

SonicWall Says All Firewall Backups Were Accessed by Hackers
10
Oct
2025

SonicWall Says Hackers Breached All of Its Firewall Backups

In September 2025, SonicWall reported a data breach of its cloud backup service, stating that fewer than 5% of its…

Matt Kapko
09
Oct
2025

SonicWall admits attacker accessed all customer firewall configurations stored on cloud portal

A brute-force attack exposed firewall configuration files of every SonicWall customer who used the company’s cloud backup service, the besieged…