Very Attacked People (VAPs) are doing cybercriminals’ work for them: report
Over 99 percent of attacks wouldn’t happen without the help of their victims
David Braue | 13 Sep | Read more
Over 99 percent of attacks wouldn’t happen without the help of their victims
David Braue | 13 Sep | Read more
Telstra calls on industry, government and regulators to address Australia's scam call problem.
Privacy, financial regulators pivot on cybersecurity risk as Home Affairs crowdsources cybersecurity strategy update
David Braue | 12 Sep | Read more
After Chrome 77, don't expect to see many more green indicators spelling out a company's name in a distinct space in the URL bar.
The inaugural Women in Security Conference & Awards was held with a sellout crowd and a dynamic roster of speakers that talked enthusiastically about their roles in cybersecurity, the challenges and advantages of being women in the industry, and the importance of engagement within the cybersecurity industry to make the most out of increasingly diverse working teams.
David Braue | 11 Sep | Read more
Staff for empathy and engage constructively to legitimise red-teaming mission
David Braue | 11 Sep | Read more
Business email compromise fraud shows no signs of slowing, according to new figures from the FBI.
Open source Metasploit has released a new BlueKeep exploit module, making it even more critical for organizations to install Microsoft's patch now.
Criminals listen to FBI advice to tackle email fraud by picking up the phone
A series of dynamic technical talks at the inaugural CSO Australia-AWSN Women in Security conference highlighted the innovative perspectives and problem-solving nous that women bring to cybersecurity roles.
David Braue | 04 Sep | Read more
Microsoft's Chromium-based Edge moves closer to general availability.
Australian government cybersecurity experts were practically screaming at system administrators to
David Braue | 20 Aug | Read more
GitHub's token scanning service now scans tokens issued by most major cloud providers.
Google study shows why credential stuffing attacks work.
ASD explains how and why organizations should implement DMARC.
Plan now to minimise consequences if attacks escalate “beyond proportionality”, ex-FBI cyber expert advises
David Braue | 13 Aug | Read more
Up to 50,000 Windows devices are vulnerable, according to the ASD.
All I keep seeing is articles and talks about 5G being rolled out around the world. Australia is pushing ahead to try and be one of the leaders in that market.
Craig Ford | 09 Aug | Read more
Investigation finds the line between the two is blurrier than you think – and data is being exposed
David Braue | 08 Aug | Read more
Merger mania is seeing new organisations absorbed quickly – but without care, exploitable security gaps are inevitable
David Braue | 07 Aug | Read more