
NIST is seeking comments on the Final Public Draft of NIST Special Publication (SP) 800-160 Volume 2, Developing Cyber Resilient Systems: A…


Bounty awards increased 65% on average as a quarter of all vulnerabilities reported are being classified as high to critical…




NIST Releases Special Publication 800-52 Rev. 2 NIST has released a Special Publication (SP) 800-52 Revision 2, Guidelines for the Selection,…


McAfee Labs sees 504 new threats per minute in Q1 2019; Data breaches facilitate attacks on large organisations; Majority of…


Dubbed “Access Mining,” TAU’s discovery demonstrates how cryptomining malware has been enhanced to steal system access information for possible sale…


This quarter report on data breaches in Australia has seen a significant increase in reported data breaches in the financial…




The final version of the National Institute of Standards and Technology (NIST) Special Publication (SP) 1800-12, Derived Personal Identity Verification (PIV) Credentials, is now…


Research conducted by Deakin researchers has found that readily available consumer spyware products potentially violate a range of Australian laws,…



Sophos (LSE: SOPH) has announced the findings of its report, The Future of Cybersecurity in Asia Pacific and Japan –…



Sophos has published a detailed threat research from SophosLabs on Baldr, an information-stealer that first appeared January 2019. The report,…