Defence CTO retires from the public service
Defence’s chief technology officer Peter Alexander has retired from the Australian public service after a 31-year stint spanning multiple government departments and agencies. Peter Alexander. Department…
Defence’s chief technology officer Peter Alexander has retired from the Australian public service after a 31-year stint spanning multiple government departments and agencies. Peter Alexander. Department…
The integration of Large Language Models (LLMs) into ransomware operations marks a pivotal shift in the cybercrime landscape, functioning as a potent operational accelerator rather…
OpenAI’s ChatGPT has emerged as La Trobe University’s dominant generative AI tool despite Microsoft’s Copilot having had a headstart in the research-focused education institution. La…
A new class of internet-based attacks is turning solar power infrastructure into a high‑risk target, allowing hackers to disrupt energy production in minutes using nothing…
Russian state-sponsored threat actors linked to the GRU (Glavnoye Razvedyvatelnoye Upravleniye, or Main Intelligence Directorate) are increasingly breaching into critical infrastructure networks by exploiting basic…
Photo booths are great. You press a button and get instant results. The same can’t be said, allegedly, for the security practices of at least…
Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management…
Last spring, CellarTracker, a wine-collection app, built an AI-powered sommelier to make unvarnished wine recommendations based on a person’s palate. The problem was the chatbot…
The Texas Attorney General sued five major television manufacturers, accusing them of illegally collecting their users’ data by secretly recording what they watch using Automated…
Microsoft has released comprehensive mitigations for a critical vulnerability dubbed React2Shell (CVE-2025-55182), which poses severe risks to React Server Components and Next.js environments. With a…
Comparing data breaches is like comparing apples and oranges. They differ on many levels. To news media, the size of the brand, how many users…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. A Russia-linked hacker group has been targeting…