From ‘hi mum’ to crypto fraud: five of the latest scams to watch out forAustralians are losing millions of dollars a week to increasingly common swindles....
Author:
It’s never too early to chat to your kids about online safety | Sarah Ayoub
It’s never too early to chat to your kids about online safety | Sarah AyoubShowing your child you are interested in their digital world is the...
Scammer who targeted Optus hack victims avoids jail over ‘unsophisticated’ crime
Scammer who targeted Optus hack victims avoids jail over ‘unsophisticated’ crimeThe man, now 20, texted 92 Optus customers demanding they give him $2,000 or face ‘financial...
Beware of Valentine’s Day romance fraud, UK online daters told
Beware of Valentine’s Day romance fraud, UK online daters toldVictim Support reports 38% rise in people affected by dating scams and gives advice on avoiding fake...
Australia should force banks to repay scam victims and adopt better protections, advocates say
Australia should force banks to repay scam victims and adopt better protections, advocates sayCalls for federal government to mandate the checking of account details before money...
How undercover reporters caught ‘Team Jorge’ disinformation operatives on camera
How undercover reporters caught ‘Team Jorge’ disinformation operatives on cameraFor more than six months, undercover reporters posed as consultants working on behalf of a businessman who...
‘They bleed you dry’: the recruitment scammers preying on Australian job seekers
‘They bleed you dry’: the recruitment scammers preying on Australian job seekersAs cybercriminals increasingly target the job market, antipoverty advocates say punitive welfare rules leave job...
Twitter, TikTok and Google forced to reveal what they do to combat child abuse
Twitter, TikTok and Google forced to reveal what they do to combat child abuseLegal notice from eSafety commissioner comes after Twitter’s massive job cuts to its...
Researchers Create an AI Cyber Defender That Reacts to Attackers
Researchers Create an AI Cyber Defender That Reacts to AttackersThe system based on deep reinforcement learning can adapt to defenders' tactics and stop 95% of simulated...
Majority of Ransomware Attacks Last Year Exploited Old Bugs
Majority of Ransomware Attacks Last Year Exploited Old BugsNew research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from...
Modern Software: What’s Really Inside?
Modern Software: What's Really Inside?Open source has changed the software game from build or buy to assemble with care.Read MoreDark ReadingOpen source has changed the software...
Despite Breach, LastPass Demonstrates the Power of Password Management
Despite Breach, LastPass Demonstrates the Power of Password ManagementWhat's scarier than keeping all of your passwords in one place and having that place raided by hackers?...
Insider Threats Don’t Mean Insiders Are Threatening
Insider Threats Don't Mean Insiders Are ThreateningBy implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by...
Google Delivers Record-Breaking $12M in Bug Bounties
Google Delivers Record-Breaking $12M in Bug BountiesGoogle's Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities...
Phishing Fears Ramp Up on Email, Collaboration Platforms
Phishing Fears Ramp Up on Email, Collaboration PlatformsIt's a banner year for attacks coming through traditional email as well as newer collaboration technologies, such as Slack...
US Military Emails Exposed via Cloud Account
US Military Emails Exposed via Cloud AccountA DoD email server hosted in the cloud (and now secured) had no password protection in place for at least...
Entitle Brings Fine-Grained Cloud Permissions Management Out of Stealth
Entitle Brings Fine-Grained Cloud Permissions Management Out of StealthThe platform uses no-code policy workflows to automate the provisioning and revoking of permissions.Read MoreDark ReadingThe platform uses...
1 in 4 CISOs Wants to Say Sayonara to Security
1 in 4 CISOs Wants to Say Sayonara to SecurityThanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today's...
Half of Apps Have High-Risk Vulnerabilities Due to Open Source
Half of Apps Have High-Risk Vulnerabilities Due to Open SourceOpen source software dependencies are affecting the software security of different industries in different ways, with mature...
Scammers Mimic ChatGPT to Steal Business Credentials
Scammers Mimic ChatGPT to Steal Business CredentialsHackers will take anything newsworthy and turn it against you, including the world's most advanced AI-enabled chatbot.Read MoreDark ReadingHackers will...
UL Solutions Advances Automotive Safety and Security
UL Solutions Advances Automotive Safety and SecurityA combined team of UL Solutions safety science experts will address automotive cybersecurity, functional safety, automated driving and software development...
Yes, Virginia, ChatGPT Can Be Used to Write Phishing Emails
Yes, Virginia, ChatGPT Can Be Used to Write Phishing EmailsBut for All AI Malicious Use Cases, Better Alternatives Abound - At Least So FarWill large language...
Why Is AT&T Cybersecurity Such a Good Acquisition Target?
Why Is AT&T Cybersecurity Such a Good Acquisition Target?Analysts Praised AT&T Cybersecurity for Bringing Threat Intel and MSS TogetherAT&T wants to unload its cyber assets just...
Live Discussion | How to Unlock the Power of Data Analytics for Improved Cybersecurity Decision-Making
Live Discussion | How to Unlock the Power of Data Analytics for Improved Cybersecurity Decision-MakingPost ContentRead MoreDataBreachToday.com RSS Syndication
DDoS Attacks Becoming More Potent, Shorter in Duration
DDoS Attacks Becoming More Potent, Shorter in DurationUS, India and East Asia Were Top Targets in 2022, Microsoft Report SaysIn a new report, tech giant Microsoft...
New HardBit 2.0 Ransomware Tactics Target Insurance Coverage
New HardBit 2.0 Ransomware Tactics Target Insurance CoverageHackers Demand Info on Victim's Cyber Insurance Policy to Negotiate Ransom DemandThe newly relaunched HardBit 2.0 ransomware group is...
5 Lawsuits Filed in Ransomware Breach Affecting 3.3 Million
5 Lawsuits Filed in Ransomware Breach Affecting 3.3 MillionProposed Class Actions Against Regal Medical Group Allege Negligence, Other ClaimsFive proposed class action lawsuits have been filed...
La Agencia de Ciberseguridad CISA agrega tres nuevas vulnerabilidades en el catálogo de KEV
La Agencia de Ciberseguridad CISA agrega tres nuevas vulnerabilidades en el catálogo de KEVLa Agencia de Seguridad de Infraestructura y Ciberseguridad de EE. UU. (CISA) agregó...
Gcore frustra un ataque DDoS masivo de 650 Gbps en un cliente de plan gratuito
Gcore frustra un ataque DDoS masivo de 650 Gbps en un cliente de plan gratuitoA principios de enero, Gcore enfrentó un incidente que involucró varios ataques...
Inglis Retires as National Cyber Director Ahead of Biden’s Cybersecurity EO
Inglis Retires as National Cyber Director Ahead of Biden's Cybersecurity EOThe long-time NSA and cyber specialist says he's exiting the public sector.Read MoreDark ReadingThe long-time NSA...