TPG Telecom shuttered 43 systems in tech transformation project
27
Feb
2024

TPG Telecom shuttered 43 systems in tech transformation project – Telco/ISP – Security

TPG Telecom’s ongoing tech transformation project saw 43 systems decommissioned in 2023, as the company looks to simplify both its…

Hacker
27
Feb
2024

New IDAT loader version uses steganography to push Remcos RAT

A hacking group tracked as ‘UAC-0184’ was observed utilizing steganographic image files to deliver the Remcos remote access trojan (RAT)…

Storage and backup spend in 2024 targets risk and resilience
27
Feb
2024

Storage and backup spend in 2024 targets risk and resilience

Storage and backup investment plans for 2024 show a significant bias towards averting risk and building resilience. At the same…

SMS phishing charges for three Sydney men
27
Feb
2024

SMS phishing charges for three Sydney men – Strategy – Security

NSW Police have charged three men following an investigation into an SMS phishing scam operation. Officers from Strike Force Kanbi…

A cyber attack hit Thyssenkrupp Automotive Body Solutions BU
27
Feb
2024

A cyber attack hit Thyssenkrupp Automotive Body Solutions BU

A cyber attack hit Thyssenkrupp Automotive Body Solutions business unit Pierluigi Paganini February 26, 2024 ThyssenKrupp disclosed a security breach that…

Hacker
27
Feb
2024

Hackers exploit 14-year-old CMS editor on govt, edu sites for SEO poisoning

Threat actors are exploiting a CMS editor discontinued 14 years ago to compromise education and government entities worldwide to poison…

LockBit Ransomware Gang Returns, Taunts FBI and Vows Data Leaks
26
Feb
2024

LockBit Ransomware Gang Returns, Taunts FBI and Vows Data Leaks

Despite arrests, infrastructure seizure and international law enforcement efforts, LockBit ransomware has resurfaced, promising robust security and threatening aggressive cyber…

SIEM Implementation: Strategies and Best Practices
26
Feb
2024

SIEM Implementation: Strategies and Best Practices

26 Feb SIEM Implementation: Strategies and Best Practices Learn how to optimize your SIEM solution with key strategies and practices….

Controversial Post Office Capture system was developed in-house
26
Feb
2024

Government won’t rush to include Post Office Capture convictions in overturning legislation

The government will not automatically include prosecutions of subpostmasters that used the Post Office’s old Capture software within forthcoming legislation…

Lockbit cybercrime gang says it is back online
26
Feb
2024

Lockbit cybercrime gang says it is back online – Security

Lockbit, the cybercrime gang that was knocked offline by a comprehensive international police operation earlier this month, says it has…

Improving Security with Wallarm's NIST CSF 2.0 Dashboard
26
Feb
2024

Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated,…

Hacker cloud
26
Feb
2024

Russian hackers shift to cloud attacks, US and allies warn

Members of the Five Eyes (FVEY) intelligence alliance warned today that APT29 Russian Foreign Intelligence Service (SVR) hackers are now switching to…