NSW Telco Authority seeks disaster connectivity kits for communities
18
Mar
2024

NSW Telco Authority seeks disaster connectivity kits for communities – Telco/ISP

The NSW government is acquiring mobile systems to help provide wi-fi connectivity to communities cut off by natural disasters. The…

NIST key
18
Mar
2024

How the New NIST 2.0 Guidelines Help Detect SaaS Threats

Article written by Hananel Livneh, Head of Product Marketing at Adaptive Shield. The SaaS ecosystem has exploded in the six…

Chinese APT Hackers Earth Krahang Exploits Government Exchange Servers
18
Mar
2024

Chinese APT Hackers Earth Krahang Exploits Government Exchange Servers

A new Advanced Persistent Threat (APT) campaign, dubbed Earth Krahang, has emerged with a focus on infiltrating government entities across…

Fujitsu Hacked - Attackers Infected The Computers with Malware
18
Mar
2024

Fujitsu Hacked – Attackers Infected The Computers with Malware

Fujitsu Limited announced the discovery of malware on several of its operational computers, raising concerns over the potential leak of…

How the DSMA balances security and privacy with press freedom
18
Mar
2024

The Security Interviews: Alex Yampolskiy, SecurityScorecard

If he wasn’t running SecurityScorecard, says Alex Yampolskiy, he would probably be sitting in a park in New York City,…

ACCC examines AI's influence on internet search
18
Mar
2024

ACCC examines AI’s influence on internet search – Software

The Australian Competition and Consumer Commission is examining the impact of generative AI on internet search. The technology’s introduction is likely the…

Top 5 Data Breaches That Cost Millions
18
Mar
2024

Top 5 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using…

Apex Legends
18
Mar
2024

Apex Legends players worried about RCE flaw after ALGS hacks

Electronic Arts has postponed the North American (NA) finals of the ongoing Apex Legends Global Series (ALGS) after hackers compromised…

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM
18
Mar
2024

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding…

Hackers Using Weaponized SVG Files in Cyber Attacks
18
Mar
2024

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that has evolved significantly with the advent…

Dark Web Tool Arms Ransomware Gangs: E-commerce & Aviation Industries Targeted
18
Mar
2024

E-commerce & Aviation Industries Targeted

Cybersecurity researchers have published two concerning reports where the first report highlights the surge in cyber attacks against the aviation…

Can cyber attacks cause societal panic in America
18
Mar
2024

FBI and Interpol issue cyber alerts on ransomware and pig butchering scams

The FBI, renowned for its investigative prowess, has disclosed a troubling statistic: nearly 20% of all ransomware attacks targeting critical…