
Bitdefender investigators have today announced the discovery of a sophisticated espionage campaign that targets air transportation organisations and government entities…


Global survey shows the average cost of recovery is US$1.4 million if organisations pay the ransom, US$730,000 if they don’t…





NIST requests comments on the Draft Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for…





When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a…


Interview with Matt Hanmer, managing director for ANZ and regional director for South Pacific for Infoblox and Jasper Chik, Sales…





A new NIST Cybersecurity White Paper has been published today: Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development…


The Australian Signals Directorate and the National Security Agency have released a joint advisory in relation to the detection and…





NIST is extending the public comment period to May 20, 2020 for Draft NISTIR 8286, Integrating Cybersecurity and Enterprise Risk…



Bitdefender researchers recently found a new IoT botnet used for DDoS attacks, Dark Nexus. Bitdefender investigators have detailed the bot for…


By Mark Sayer, APAC Cyber Defence Lead, Accenture; Joseph Failla, Security Lead, Accenture Australia and New Zealand. Australian organisations are…