Networking a reconfigured workspace | Computer Weekly
26
Jun
2023

Networking a reconfigured workspace | Computer Weekly

Office-based network infrastructure – the stuff that is installed within the guts of buildings – is made to last. But…

CISOs are More Concerned with Lawsuits, and API Security
26
Jun
2023

CISOs are More Concerned with Lawsuits, and API Security

Digital initiatives play a crucial role in business today; they bring new business opportunities, fostered creative partnerships, and deliver new…

26
Jun
2023

Cyber Attack On McDonald’s Concludes With Final Data Dump

A data dump from an alleged cyber attack on McDonald’s in 2022 concluded with the last bit of information being…

Chinese Hackers
26
Jun
2023

Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks

Jun 26, 2023Ravie LakshmananCyber Espionage / LotL The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed…

Australian Prime Minister urges citizens to turn off their mobile phones to fend cyber attacks
26
Jun
2023

Australian Prime Minister urges citizens to turn off their mobile phones to fend cyber attacks

It’s strange! But its true that Australian Prime Minister Anthony Albanese has asked his citizens to turn off their mobile…

Key Considerations When Hiring a Chief Information Security Officer
26
Jun
2023

Key Considerations When Hiring a Chief Information Security Officer

In today’s interconnected world, where cyber threats loom large, organizations must prioritize information security. One crucial step towards achieving robust…

Exploring the persistent threat of cyberattacks on healthcare
26
Jun
2023

Exploring the persistent threat of cyberattacks on healthcare

In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts…

5 free online cybersecurity courses you should check out
26
Jun
2023

5 free online cybersecurity courses you should check out

Cryptography In this course, you’ll learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will…

Uncovering attacker tactics through cloud honeypots
26
Jun
2023

Uncovering attacker tactics through cloud honeypots

Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in…

Trojanized Super Mario Bros game spreads malwareSecurity Affairs
26
Jun
2023

Trojanized Super Mario Bros game spreads malwareSecurity Affairs

Researchers observed threat actors spreading a trojanized Super Mario Bros game installer to deliver multiple malware.  Researchers from Cyble Research…

Jail Time: 'PlugWalkJoe' Gets 5 Years for Twitter Hack and Sim Swapping
25
Jun
2023

‘PlugWalkJoe’ Gets 5 Years for Twitter Hack and Sim Swapping

The mastermind behind the Twitter hack, Graham Ivan Clark, is already serving a three-year sentence. A New York court has…

Australia appoints first cyber security coordinator
25
Jun
2023

Australia appoints first cyber security coordinator – Security

National Cyber Security Coordinator Darren Goldie. A four month search for the boss of a new office responsible for synchronising…