DerScanner introduces Supply Chain Security to protect third-party code elements
DerScanner adds Supply Chain Security feature to verify third-party code, combating rising threats amid increasing open-source software cyberattacks.
Eagers Automotive partners with SentinelOne to boost cybersecurity
Eagers Automotive, Australia's largest dealership, partners with cybersecurity firm SentinelOne to bolster its cyber defences.
Surge in counterfeit app risk as cybercrime exploits rising digital consumption
Cybercrime surge sees a 32% rise in counterfeit applications on app stores in 2023, posing a serious threat to user safety.
Festive season online shopping spurs rise in luxury brand phishing scams
Cyber threats are on the rise this holiday season, warns Check Point Research, with a 13% increase in malicious files related to online orders and deliveries.
Tesserent predicts cybersecurity challenges & trends for 2024
Tesserent's cybersecurity experts anticipate AI risks, a growing skills shortage, and regulatory changes by 2024.
Australia pledges no ransom payments for cyber attacks at CRI Summit
Australia officially pledges at the CRI Summit not to pay ransom for cyber attacks, affirming its dedication to combatting global cybercrime.
Generative AI: A disruptive force at the hands of cyber attackers
Generative AI tools in the wrong hands are a serious threat, which is why their use must be regulated properly.
CAST unveils autumn release of software intelligence product
CAST has launched their autumn release of software intelligence product, CAST Highlight, designed to enhance cloud migration and optimisation.
RSM Australia shares top cybersecurity tips for risk management executives
RSM Australia outlines top 5 cybersecurity tips for risk management execs to enhance business security measures.
Organisations fail to see benefit of ethical hacking - report
52% of security professionals prefer to accept undiscovered vulnerabilities than work with hackers, HackerOne data shows.
Semperis Forest Druid to support Microsoft Entra ID enhancing cybersecurity
Semperis enhances Forest Druid tool to support Microsoft Entra ID, strengthening defenses against cyber threats.
National Cybersecurity Week: Cyber awareness for non-tech savvy
National Cybersecurity Week highlights the need to boost cyber awareness, especially for the non-tech savvy group.
CybeReady launches SME-focused security training solution
CybeReady has launched a new version of its security training platform, tailored for small and medium-sized enterprises.
New report highlights shocking business cybercrime costs
Cybercrime attacks cost US and UK businesses into the hundreds of thousands with the majority targeted multiple times.
Protect Your Employees From Becoming A ‘Single Point of Failure’
IT departments need to work closely with HR to ensure employees' roles – and their subsequent access levels – are clearly defined.
Young hackers: redirecting talents from cyber-bad to cyber-good
The rise of young hackers in the cybersecurity industry is a growing concern that needs to be addressed urgently, says journalist.
Operate without opening the chest: identifying VMware vulnerabilities
IT managers should immediately check whether they have already installed this critical patch and do so as soon as possible.
HackerOne launches Gold Standard Safe Harbour statement
The GSSH is a short, broad, easily-understood safe harbour statement that’s simple for customers to adopt, HackerOne states.
OpenText survey finds SMBs sweet spot for ransomware attacks
Findings show growing concern about ransomware attacks, the impact of geopolitical tensions and rising inflation rates.
Data loss prevention market to reach $12 billion by 2027
Rising compliance and regulatory requirements across the globe are the key factors driving the growth of the Data Loss Prevention market.
Pinnacle cyber attack: Beware of suspicious emails, messages and bank activity - Deputy Privacy Commissioner
The Privacy Commission is advising victims of the Pinnacle hack to be wary of any suspicious cellphone communication or bank activity.
Zero-day attacks climb as hackers get more sophisticated
Hackers are exploiting security vulnerabilities faster than ever before, with the average time to exploitation down from 42 days to just 12 days.
Companies rushing to secure print infrastructure
Lack of firmware updates leaves print infrastructure vulnerable to cyber attacks, with hackers exploiting security gaps. Managed service providers can assist.
Native technologies used in Russia-Ukraine cyber attacks
The conflict between Russia and Ukraine is raging not only in the physical realm, but also on the cyber front.