Female representation in cybersecurity leadership roles matters

Female representation in cybersecurity leadership roles matters

Progress towards achieving equal representation in tech is headed in the right direction. The representation of women in the Australian tech industry increased slightly, rising from 29% in 2021 to 31% in 2022. Additionally, the gender pay gap in the sector is half that of other highly paid sectors, such as finance or professional services. […]

Female representation in cybersecurity leadership roles matters Read More »

Fake Browser Updates Used in Malware Distribution - Infosecurity Magazine

Fake Browser Updates Used in Malware Distribution – Infosecurity Magazine

Cybersecurity researchers from Proofpoint have identified a rising trend in threat activity that employs fake browser updates to disseminate malware.  At least four distinct threat clusters have been tracked utilizing this deceptive tactic. Fake browser updates are compromised websites that display fake notifications mimicking popular browsers like Chrome, Firefox or Edge, luring users into downloading

Fake Browser Updates Used in Malware Distribution – Infosecurity Magazine Read More »

Cybersecurity concerns rise as organisations bolster defences

Cybersecurity concerns rise as organisations bolster defences

As cybersecurity concerns resurge, new research by Genetec, a provider of technology for unified security, highlights that an increasing number of organisations are ramping up their defences. Genetec’s research collected insights from over 5,500 global physical security leaders and discovered that cybersecurity remains a vital concern despite the implementation of new safeguarding processes. The Genetec

Cybersecurity concerns rise as organisations bolster defences Read More »

Regulations are still necessary to compel adoption of cybersecurity measures

Regulations are still necessary to compel adoption of cybersecurity measures

Regulations are still necessary to make sure organizations are compelled to adopt measures designed to strengthen their cybersecurity posture. Singapore this week released guides it said will help organizations, including small- and mid-sized businesses (SMBs), better understand risks associated with using cloud services and what they, as well as their cloud providers, need to do

Regulations are still necessary to compel adoption of cybersecurity measures Read More »

The Super SA data hack impacted thousands but took two months to come to light. Here's what we know - ABC News

The Super SA data hack impacted thousands but took two months to come to light. Here’s what we know – ABC News

“It’s simply not good enough.” That’s how South Australian treasurer Stephen Mullighan reacted in parliament on Wednesday when he was asked about a cyber security breach involving government superannuation provider Super SA. Information linked to more than 14,000 members was accessed by hackers about two months ago. But Mr Mullighan said he only found out about the incident less

The Super SA data hack impacted thousands but took two months to come to light. Here’s what we know – ABC News Read More »

ToddyCat hackers use 'disposable' malware to target Asian telecoms

ToddyCat hackers use ‘disposable’ malware to target Asian telecoms

A newly discovered campaign dubbed “Stayin’ Alive” has been targeting government organizations and telecommunication service providers across Asia since 2021, using a wide variety of “disposable” malware to evade detection. Most of the campaign’s targets seen by cybersecurity firm Check Point are based in Kazakhstan, Uzbekistan, Pakistan, and Vietnam, while the campaign is still underway.

ToddyCat hackers use ‘disposable’ malware to target Asian telecoms Read More »

New threat report reveals true dominance of ransomware

Elastic has announced its second Elastic Global Threat Report, issued by Elastic Security Labs. Based on observations from more than 1 billion data points over the last 12 months, the report reveals ransomware is expanding and diversifying; more than half of all observed malware infections were on Linux systems; and credential access techniques have become

New threat report reveals true dominance of ransomware Read More »

Cybersecurity ops not an immediate priority for CIOs

One in five CIOs believe cybersecurity ops are not an immediate priority, according to new research. In April 2023, Acora conducted a survey that revealed insights into the changing responsibilities of Chief Information Officers (CIOs), focusing on mid-market companies. The research included 126 decision-makers from financial services companies and aimed to identify the difficulties and

Cybersecurity ops not an immediate priority for CIOs Read More »

6 simple cybersecurity rules you can apply now

If you’re an IT pro or a serious PC hobbyist, computers are as logical as Mr. Spock. If you’re a human being without a technical background, the average Windows error message might as well be written in Klingon. For that latter audience, computer security often devolves into magical thinking. That’s unfortunate because the reality is

6 simple cybersecurity rules you can apply now Read More »

Three Chinese nationals sentenced in Adelaide after using stolen details from phishing scam - ABC News

Three Chinese nationals sentenced in Adelaide after using stolen details from phishing scam – ABC News

Three Chinese nationals living in Australia who used stolen personal information to make fraudulent transactions will be released from prison in a month, while a third will walk free immediately. Key points: Renzhong Chen, 31, Sheng Li, 25, and Xiaoxin Zheng, 20, were arrested in November after using details from a phishing scam, which is believed

Three Chinese nationals sentenced in Adelaide after using stolen details from phishing scam – ABC News Read More »

Scroll to Top