Cisco DNA Center Privilege Escalation VulnerabilityA vulnerability in the management API of Cisco DNA Center could allow an authenticated, remote attacker to elevate privileges in the...
Is it worth taking out personal cyber insurance in case you are caught up in a data hack?
Is it worth taking out personal cyber insurance in case you are caught up in a data hack?Experts say investing in identity theft protection may provide...
Password app LastPass hit by cybersecurity breach but says data remains safe
Password app LastPass hit by cybersecurity breach but says data remains safeCompany says its security system prevented the hacker accessing customer data or encrypted passwords Follow...
Medibank hackers announce ‘case closed’ and dump huge data file on dark web
Medibank hackers announce ‘case closed’ and dump huge data file on dark webMedibank confirms it may be the full trove of hundreds of thousands of customers’...
I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?
I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?Experts suggest using multifactor authentication and telling your bank...
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hackTelecommunications company says hacker searched for customers’ cryptocurrency and financial information Follow our Australia news...
Telstra sorry for publishing up to 130,000 customers’ details online
Telstra sorry for publishing up to 130,000 customers’ details onlineRelease of names, numbers and addresses of some unlisted customers was not due to cyber-attack Follow our...
Clare O’Neil on national security amid cyber hacks and threats to democracy
Clare O’Neil on national security amid cyber hacks and threats to democracyIn the final episode of Australian Politics for 2022, political editor Katharine Murphy speaks to...
Corelight Pursues IR Partnerships, Smaller Enterprise Deals
Corelight Pursues IR Partnerships, Smaller Enterprise DealsCEO Brian Dye Touts CrowdStrike Partnership, Midsized Enterprises as Key to GrowthCorelight has cemented partnerships with incident response firms and...
Device Maker Zoll Facing 7 Lawsuits in Wake of Breach
Device Maker Zoll Facing 7 Lawsuits in Wake of BreachProposed Class Actions Come in Aftermath of Hacking Incident Affecting More Than 1 MillionMedical device maker Zoll...
US Sends Cyber Team to Aid Albania’s Cyber Defenses
US Sends Cyber Team to Aid Albania's Cyber DefensesMission Helped Find Threats, Vulnerabilities in Albania's Critical InfrastructureThe United States sent its top cyber offensive team to...
How BreachForums’ ‘Pompompurin’ Led the FBI to His Home
How BreachForums' 'Pompompurin' Led the FBI to His HomePolice: Fitzpatrick Waived Right to Silence, Confessed to Starting & Running ForumThe alleged administrator of criminal online forum...
UK parliament follows government by banning TikTok over cybersecurity concerns
UK parliament follows government by banning TikTok over cybersecurity concernsThe commissions of the House of Commons and House of Lords have followed the UK government by...
Critical flaw in AI testing framework MLflow can lead to server and data compromise
Critical flaw in AI testing framework MLflow can lead to server and data compromiseMLflow, an open-source framework that's used by many organizations to manage their machine-learning...
Android-based banking Trojan Nexus now available as malware-as-a-service
Android-based banking Trojan Nexus now available as malware-as-a-serviceItalian cybersecurity firm Cleafy has found “Nexus”, a new Android Trojan capable of hijacking online accounts and siphoning funds...
Security Flaws Cost Fifth of Execs Business
Security Flaws Cost Fifth of Execs BusinessBusiness leaders still underestimate importance of security to growthRead MoreBusiness leaders still underestimate importance of security to growth
UK Parliament Bans TikTok from its Network and Devices
UK Parliament Bans TikTok from its Network and DevicesFurther blow for Chinese social media appRead MoreFurther blow for Chinese social media app
IRS Phishing Emails Used to Distribute Emotet
IRS Phishing Emails Used to Distribute EmotetMonster 500MB attachment hides a nasty surpriseRead MoreMonster 500MB attachment hides a nasty surprise
GitHub Updates Security Protocol For Operations Over SSH
GitHub Updates Security Protocol For Operations Over SSHThe move reportedly did not stem from a compromise of GitHub systems or customer informationRead MoreThe move reportedly did...
WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
WooCommerce Patches Critical Plugin Flaw Affecting Half a Million SitesThe vulnerability could allow an unauthenticated attacker to gain admin privileges and take over a websiteRead MoreThe...
CISA Unveils Ransomware Notification Initiative
CISA Unveils Ransomware Notification InitiativeProvides businesses with early warnings to evict threat actors before they can encrypt dataRead MoreProvides businesses with early warnings to evict threat...
Pwn2Own Vancouver 2023 Day 2: Microsoft Teams, Oracle VirtualBox, and Tesla hacked
Pwn2Own Vancouver 2023 Day 2: Microsoft Teams, Oracle VirtualBox, and Tesla hackedOn the second day of Pwn2Own Vancouver 2023, the organization awarded $475,000 for 10 unique...
Critical flaw in WooCommerce Payments plugin allows site takeover
Critical flaw in WooCommerce Payments plugin allows site takeoverA patch for a critical vulnerability in the WooCommerce Payments plugin for WordPress has been released for over...
Drive-by Download Attack – What It Is and How It Works
Drive-by Download Attack – What It Is and How It WorksIn today’s digital age, cybersecurity is more important than ever before. Unfortunately, cybercriminals are constantly finding...
The City of Toronto, Among This Week’s Victims of GoAnywhere Attacks
The City of Toronto, Among This Week’s Victims of GoAnywhere AttacksThe City of Toronto announced a data breach caused by GoAnywhere attacks. Clop ransomware, the gang...
Enhanced Version of the BlackGuard Stealer Spotted in the Wild
Enhanced Version of the BlackGuard Stealer Spotted in the WildA new variant of the BlackGuard stealer has been discovered in the wild, with new features such...
The Most Prevalent Types of Ransomware You Need to Know About
The Most Prevalent Types of Ransomware You Need to Know AboutCyberthieves of today are adaptable – they are excellent at finding new ways to survive and...
Chinese Hackers Infiltrate Middle Eastern Telecom Companies
Chinese Hackers Infiltrate Middle Eastern Telecom CompaniesNew cyber attacks against Middle Eastern telecommunications operators emerged in the first quarter of 2023. Based on technical overlaps, the...
Find Out What Is a Logic Bomb. Definition, Characteristics, and Protection Measures
Find Out What Is a Logic Bomb. Definition, Characteristics, and Protection MeasuresToday we are talking about one of the sneakiest cybersecurity threats out there: the logic...
What Is Quishing: QR Code Phishing Explained
What Is Quishing: QR Code Phishing ExplainedAre you aware of QR code phishing or “quishing”? This form of social engineering attack is gaining popularity among cybercriminals...





























