Cyber Security

In the rush to embrace IoT devices, we shouldn’t trade in our privacy and security for the added convenience. Ours is an interconnected world. We have smart doorbells, so we can check on our smartphones who rang, smartwatches to track our children’s’ locations, and fitness trackers to see how we are doing with our physical health. The Internet of Things revolution has even swept our households...

Read More

Joint Statement Australian Department of Foreign Affairs and Trade Australian Cyber Security Centre As Australians and the international community band together to respond to COVID-19, the Australian Government is concerned that malicious cyber actors are seeking to exploit the pandemic for their own gain. Of particular concern are reports that malicious cyber actors are seeking to damage or impair the operation of hospitals, medical services and facilities, and crisis...

Read More

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe. The cyberespionage malware—traced to Turla APT with "medium-to-low level of confidence" based on the history of compromised victims—spread via an initial dropper that masks itself as a visa application, the Global Research...

Read More

DigitalOcean, one of the biggest modern web hosting platforms, recently hit with a concerning data leak incident that exposed some of its customers' data to unknown and unauthorised third parties. Though the hosting company has not yet publicly released a statement, it did has started warning affected customers of the scope of the breach via an email. According to the breach notification email that affected customers [1,...

Read More

The money companies are spending on cybersecurity tools doesn't necessarily result in better security, a new survey shows. Organisations of all sizes are under near-constant attack from cybercriminals — that we know. And of course they must defend themselves against attacks. But there are some huge questions about just how effective their ability to do so is. A new report by Mandiant Security Validation aims to...

Read More

…and why are they selling it to other security vendors and product testers? If you were hoping to find a sensational story outing one of our competitors, I am going to disappoint you right away. This is not that, but it is something, something that can happen to all of us! Spam is something that everyone encounters. Spammers are constantly looking for new ways to get their garbage...

Read More

Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system. Azure Sphere was unveiled in April 2018 as a means to improve security for devices connected to the Internet of Things (IoT). It's made up of three parts: connected microcontrollers, a Linux-based OS and custom kernel to power them, and a security service to protect the connected devices....

Read More

The Coronavirus crisis introduces critical operational challenges to business continuity, placing high stress on organisations' management. As a result, CIOs and CISOs face a double challenge on the cyber risk front – apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than ever. The Definitive Corona Cyber Security for Management PPT...

Read More

Records Management is intended to help businesses manage security and data governance as more struggle to handle increased amounts of data and regulatory requirements. Microsoft today announced the general availability of Records Management in Microsoft 365, a new tool built to help businesses protect and manage sensitive data. Many struggle to create strong security, privacy, and risk capabilities, especially as the pandemic shifts operations. A new Harvard...

Read More