What motivates hackers and what makes them walk away
Most hackers spend more time learning, testing, and comparing notes than breaking into systems. The work often happens alone or in small groups, shaped by…
Most hackers spend more time learning, testing, and comparing notes than breaking into systems. The work often happens alone or in small groups, shaped by…
Australian businesses are now facing significantly more network-based attacks than traditional malware, according to WatchGuard Technologies’ Q4 2025 Threat Landscape Report, highlighting a marked shift…
Researchers have unveiled a new approach to powering quantum computers using quantum batteries, a development that could significantly improve the performance, efficiency and scalability of…
Services Australia has agreed to document the business rules used by its 40-year-old mainframe-based core system to calculate aged pension entitlements after a series of…
ISACA’s newly released State of Privacy 2026 survey warns that privacy teams across Oceania are under increasing pressure as resources shrink and risk continues to grow, turning…
Woolworths Group has moved to fill an impending gap in its board’s technology leadership credentials, created by the departure of former Microsoft Australia chief executive…
The CyberArk Labs team have identified Apache bRPC users are exposed to a critical command injection flaw in the /pprof/heap endpoint (CVE‑2025‑60021, CVSS 9.8) that…
The acting director of the Cybersecurity and Infrastructure Security Agency (CISA) uploaded sensitive contracting documents marked “for official use only” into the public version of…
Dragos has released a detailed threat intelligence report providing the first in-depth operational technology (OT) security analysis of the 29 December cyberattack on Poland’s electric…
Rapid7 has appointed Simon Ractliffe (pictured) as General Manager for its Asia Pacific and Japan (APJ) business, strengthening regional leadership as the company accelerates growth…
ESET researchers have identified an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan. The operation relies on a malicious app…
A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access trojan to gain network access that could lead…