
Bishop Fox researchers have successfully exploited CVE-2024-53704, an authentication bypass affecting the SSL VPN component of unpatched SonicWall firewalls. According…

Vonahi Security, an automated network penetration testing company, is proud to announce its recent accreditation by CREST in Australasia. The…

By Dr Warren Doudle, Edith Cowan University Throughout history we see examples of cunning tacticians and daring commanders who have…

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian…

Macquarie Government has expanded its four-year partnership with global SASE (Secure Access Service Edge) leader, Netskope, following a large-scale federal government…

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Australian Signals Directorate’s Australian Cyber Security…

ASX-listed Sovereign Cloud Holdings Limited is changing its name to AUCyber Limited and will operate two distinct brands – AUCloud…

Criminals are emailing people and falsely claiming they have hacked into their computers or webcams and have access to compromising…

By Riccardo Galbiati, Regional Chief Security Officer, JAPAC, at Palo Alto Networks Integrating new technologies into existing industrial systems is…

According to new research from the Information Systems Audit and Control Association, better known as ISACA, nearly two-thirds of cybersecurity…