Australian supermarkets, transport next for cyber exercises – Security
Food and grocery, finance, and transport will be the next three industries to have their cyber security tested under the government’s National Cyber Security Exercise…
Food and grocery, finance, and transport will be the next three industries to have their cyber security tested under the government’s National Cyber Security Exercise…
A new phishing-as-a-service (PhaaS) named ‘Darcula’ uses 20,000 domains to spoof brands and steal credentials from Android and iPhone users in more than 100 countries.…
In a significant development in the realm of cybersecurity, two critical vulnerabilities in Microsoft SharePoint Server, identified as CVE-2023-24955 and CVE-2023-29357, have been brought to…
Western Australian agencies are assessing all their existing and planned automated decision-making and artificial intelligence projects under a mandatory risk regime that covers a broad range…
INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland Pierluigi Paganini March 27, 2024 The INC Ransom extortion group hacked the…
Microsoft reminded customers today that the Windows 11 22H2 Home and Pro editions will continue to receive non-security preview updates until June 26. These optional…
Google’s Threat Analysis Group (TAG) reports a concerning rise in zero-day exploits and increased activity from state-backed hackers. This highlights the growing cybersecurity threats to…
The US State Department has offered up to $10 million ($15.3 million) for information on the “Blackcat” ransomware gang who hit the UnitedHealth Group’s tech…
The INC Ransom extortion gang is threatening to publish three terabytes of data allegedly stolen after breaching the National Health Service (NHS) of Scotland. In a…
Ofgem, the UK’s energy regulator, has launched a consultation into the feasibility of introducing a more dynamic price cap on energy prices. This would be…
Google fixed seven security vulnerabilities in the Chrome web browser on Tuesday, including two zero-days exploited during the Pwn2Own Vancouver 2024 hacking competition. The first…
Threat actors operating at the behest of government backers are significantly more likely to be behind the exploitation of newly disclosed zero-day vulnerabilities than financially…