23
Aug
2023

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern…

Vic trumpets digital driver licence trial success
23
Aug
2023

Vic trumpets digital driver licence trial success – Software

The Victorian government is claiming a success for its digital driver license (DDL) pilot in Ballarat, ahead of a statewide…

23
Aug
2023

Anticipating the next wave of IoT cybersecurity challenges

In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from…

Palo Alto Networks closes door on TunnelCrack
23
Aug
2023

Palo Alto Networks closes door on TunnelCrack – Security – Networking

Palo Alto Networks has published its response to the TunnelCrack VPN eavesdropping technique that academics demonstrated earlier this month. The…

23
Aug
2023

Large-scale breaches overshadow decline in number of healthcare data incidents

While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed…

VMware brings Cloud on AWS to Melbourne
23
Aug
2023

VMware, Nvidia target businesses that want their own AI – Software

VMware has developed a new set of software tools in partnership with Nvidia aimed at businesses which want to develop…

How ChatGPT and Large Language Models Can Impact the Future of Cybersecurity
23
Aug
2023

How ChatGPT and Large Language Models Can Impact the Future of Cybersecurity

By Karthik Krishnan, CEO, Concentric AI Artificial intelligence (AI) has achieved remarkable advancements over the past few years, with examples…

Woolworths digital and analytics capabilities to only grow in importance
23
Aug
2023

Woolworths digital and analytics capabilities to only grow in importance – Strategy – Software

Woolworths Group says the role of digital and analytics capabilities is only increasing in importance, with the company continuing to…

Update now! WinRAR files can be abused to run malware
23
Aug
2023

Update now! WinRAR files can be abused to run malware

A new version of WinRAR is available that patches two vulnerabilities attackers could use for remote code execution. A new…

yet another Bug Bounty Reconnaissance Framework – honoki
23
Aug
2023

yet another Bug Bounty Reconnaissance Framework – honoki

An example use case of bbrf, here integrating with subfinder from projectdiscovery.io Like anyone involved in bug bounty hunting, I…

Alert Prioritization and Guided Remediation: The future of EDR
23
Aug
2023

Alert Prioritization and Guided Remediation: The future of EDR

Defeat alert fatigue using specialized threat intelligence. Sleepless nights, missed threats, a deluge of notifications—the common symptoms of the bane of…

23
Aug
2023

Robust identity management bolsters security and boosts revenues in higher education – Partner Content – Security

The higher education sector is highly competitive. The diverse needs of students, educators and researchers coalesce in a melting pot…