It only takes one over-privileged identity to do major damage to a cloud
28
Feb
2023

It only takes one over-privileged identity to do major damage to a cloud

While moving to the cloud increases efficiency and business agility, security strategies haven’t been adapted to account for this shift…

A week in security (February 20
28
Feb
2023

A week in security (February 20

The most interesting security related news from the week of February 20 to 26. Last week on Malwarebytes Labs: Stay…

28
Feb
2023

NSW digital birth certificate to be trialled in April – Strategy

The NSW government’s digital birth certificate (DBC) will be trialled by Vision Australia and selected early childhood education centres, according…

10 US states that suffered the most devastating data breaches in 2022
28
Feb
2023

10 US states that suffered the most devastating data breaches in 2022

Cyber attack risks faced by businesses across states and reported data breaches are relative to the respective state governments’ cybersecurity…

TikTok probed over child privacy practices
28
Feb
2023

TikTok probed over child privacy practices

Canadian privacy protection authorities have announced they will start an investigation into TikTok’s privacy practices, especially in relation to its…

28
Feb
2023

Australian orgs lodged 497 data breach notices in back half of 2022 – Security

Australian organisations experienced nearly 500 notifiable data breaches in the back half of last year, a 26 percent increase on…

LastPass logo over a password vault
28
Feb
2023

DevOps engineer hacked to steal password vault data in 2022 breach

LastPass revealed more information on a “coordinated second attack,” where a threat actor accessed and stole data from the Amazon…

28
Feb
2023

Red Hat and Samsung partner on new 5G RAN solution

Red Hat extend partnership with Samsung to introduce a virtualized radio access network (vRAN) solution that offers advanced integration and…

Fighting online censorship, or, encryption's latest surprise use-case, with Mallory Knodel: Lock and Code S04E05
28
Feb
2023

Fighting online censorship, or, encryption’s latest surprise use-case, with Mallory Knodel: Lock and Code S04E05

This week on Lock and Code, we speak with Mallory Knodel about the stories that countries tell their people to…

28
Feb
2023

University of Tasmania CIO retires – Strategy – Training & Development

The University of Tasmania is looking for a new chief information officer as incumbent Adrian Dillon retires from the role….

US Marshals
28
Feb
2023

U.S. Marshals Service investigating ransomware attack, data theft

The U.S. Marshals Service (USMS) is investigating the theft of sensitive law enforcement information following a ransomware attack that has…

5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
28
Feb
2023

5 Best Practices for a Multi-Factor Authentication (MFA) Strategy

By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management…