GUEST RESEARCH: Delinea, a leading provider of solutions for securing human and machine identities through centralised authorisation, today released its inaugural Cybersecurity and the AI Threat Landscape report. ...
... impact security strategies, requiring leaders to adapt to evolving threats, talent gaps and regulatory challenges.” As such, security leaders must understand AI’s role in the threat landscape to develop ...
Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web
Check Point Software Technologies Ltd. ...
... sophisticated, but they are increasing in number. According to Radware’s recent Global Threat Analysis Report, bad bots made up 71% of all bot traffic in 2024; and malicious bot transactions increased ...
... with zero-touch deployment. Secure remote access helps IT teams to monitor, locate, and, if necessary, isolate or disable compromised devices, preventing security breaches before they escalate.
Threat ...
... approach to building network resilience, reducing its attack surface and making it harder for threat actors to impact its environment.
In finding a solution, the ANU turned to Gigamon to serve as one ...
... of threatintelligence, FortiGuard Labs, Australia and New Zealand, Fortinet, said, “Today’s cybercriminals operate at a level of speed and sophistication that many organisations are simply unprepared ...
... times by over 50%, and mitigate threats more effectively. Exabeam is now the first and only security operations vendor delivering a multi-agent experience where specialised AI components are integrated ...
... and partners protect their most critical assets in an evolving threat landscape.”
Most recently, O’Connell led technical, operational, and strategic programs to protect critical data and infrastructure ...
Morphing Meerkat spoofs over 100 brands and steals credentials
Infoblox Threat Intel has uncovered a highly sophisticated Phishing-as-a-Service (PhaaS) platform that poses a significant threat to businesses ...
...
The growing threat landscape
Fraudsters have become more adept at exploiting vulnerabilities in digital systems. Account takeover (ATO) fraud surged by 354% in the past year, while payment fraud incidents ...
... identity combines proprietary technology and automation with human expertise to prevent, monitor, and remediate high-risk threats across the attack surface, and both the deep and dark web. With decades ...
... in Australia, with a new wave of threats enabled by AI.1
The ability to manage cyber risks whilst at the same time delivering technological transformation places CISOs and CTOs in the driver’s seat ...
... while protecting against AI model specific network threats.
Also, he said Aryaka had just launched a service in which “we use hundreds of AI models to provide a real time visibility into network security, ...
... are protected against potential threats.
2. Added Support Alongside Autonomous Tech
Commendable progress has been made in the field of autonomous cyber security systems. Intrusion Detection Systems ...
... against abuse. Now, Cloudflare customers will be able to protect themselves against the most pressing threats facing today’s AI models, including employee misuse of tools, toxic prompts, personally identifiable ...
Customers can tap into insights from Cloudflare’s global network – one of the largest in the world – which blocked an average of 227 billion cyber threats each day during Q4 2024
Cloudflare, Inc. (NYSE: ...
... internal and external threats. This is understandable considering that 84% of respondents admit losing data to an attack or mistake would be catastrophic. However, the study results showed that ignoring ...
COMPANY NEWS: Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the healthcare sector. The combination of highly sensitive ...
...
By sharing our findings with the threatintelligence community and challenging existing assumptions, we hope to encourage further research of this unconventional threat actor that has been active since ...
... host Proofpoint’s future innovations and scale AI-powered threat and data protection”.
With Azure as a foundation, the companies say they will be able to provide organisations worldwide with stronger ...
... CAPTCHAs to combat these threats leading to poor user experiences and lost conversions. Fastly’s update gives organisations the chance to break free from the CAPTCHA cycle while helping to prevent fraud, ...
Enhancing ThreatIntelligence and Threat Detection in Australian Central Government Organisations
GUEST OPINION by Cyrille Badeau, Vice-President of International Sales, at ThreatQuotient: In an era ...
... Signals Directorate (ASD) received a total of 87,000 cybercrime reports. This meant one cybercrime was reported every six minutes on average.
As cyber threats become more complex and sophisticated, ...
... hands, faster.”
Recognising the nature of the threat environment, Arkeus technology is underscored with robust data encryption technologies that have evolved through successive contracts with the Australian ...
... address this issue.
The technology embedded in Bitdefender Mobile Security, App Anomaly Detection, observes the apps’ behaviour after installation, which is critical in today’s threat landscape. In some ...
... dynamic threat landscape, this capability is becoming mission-critical for securing and managing complex hybrid cloud environments.
“The demand for greater visibility across hybrid cloud infrastructure ...
GUEST OPINION: The rapid advancement of artificial intelligence (AI) is poised to transform the job market in profound ways. As AI takes over certain tasks and jobs traditionally done by humans, many positions ...
... AI-powered cybercrime.
To assess the potential threat, Tenable’s security researchers conducted an experiment, evaluating whether DeepSeek R1 could create malicious software under two scenarios: a ...
... should be proactive about detecting malicious datasets and responding quickly to potential supply chain attacks. To do that, they must be aware of what these threats look like.
The basics of LLM-specific ...
... ransomware groups post details about their victims to develop our March 2025 Threat Debrief. It’s important to remember that we can't independently verify all of these claims, but we can feel quite confident ...
... over two-thirds (73%) predicting that machine identities will grow by up to 50% and 6% projecting radical growth of more than 50%.
AI looms large on the machine identity threat horizon – As AI systems ...
Mandiant, Google Cloud Security’s threatintelligence company, has exposed a sophisticated cyber espionage campaign by the China-linked hacking group UNC3886. The group has been found infiltrating outdated ...
SUSE Security and Microsoft Sentinel offer enhanced enterprise security posture for more complete threat protection.
SUSE, a global leader in innovative, open and secure enterprise-grade solutions, ...
... evolving cyberthreats. New enhancements go beyond traditional operational technology (OT) visibility solutions and include deeper OT-specific threat visibility with the FortiGuard OT Security Service, ...
... and respond to threats with unprecedented speed and accuracy.
The Cybersecurity Excellence Awards honour organisations and products that demonstrate excellence, innovation, and leadership in cybersecurity. ...
... high-risk threats across the attack surface, and both the deep and dark web. With decades of experience in military special operations, law enforcement, intelligence, technology, and executive protection, ...
Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
COMPANY NEWS: As organisations navigate an increasingly complex threat ...
... widespread adoption. Cyber threats in the Web3 space have escalated, with hackers exploiting vulnerabilities in smart contracts, digital wallets, and decentralised finance (DeFi) platforms among others. ...
... centre to a strategic asset
Open APIs and community-driven innovation ensure rapid response to emerging threats while reducing total ownership costs
Partnership forged with Sacumen, a specialist cybersecurity ...
... around the globe – APAC, EMEA, the US – so as a threat evolves, we can hand over to different teams in different time zones.”
Samani is one of the world’s most respected cyber security experts, assisting ...
... business email compromise (BEC) and know your customer (KYC) types of attacks. These sorts of cyber crimes are likely to escalated as criminals developed more ways to exploit GenAI tools.
“These threats ...
... alongside Adlumin XDR and Adlumin MDR, which are N-able products for security with artificial intelligence-driven threat prevention and expert-led threat monitoring. Additionally, DNS filtering for web ...
... implying that attribution is almost impossible. While difficult, attribution isn’t a guessing game. Tools like the MITRE ATT&CK framework help analysts map attack techniques back to known threat actors. ...
... intelligence, military data integration, and secure communications to drive mission-critical decisions and counter threats. The next-generation B360 Pro features extended battery life as standard for uninterrupted ...
... threat landscape.
Dale Nachman, regional director for Australia and New Zealand (ANZ) at Fortinet, said, “Stepping into this expanded leadership role is an exciting opportunity to drive Fortinet’s ...
ThreatX Protect Addresses Critical Need to Protect Against Evolving Application and API Security Threats
To continue to help customers address the rapidly evolving cyber threat landscape, A10 Networks ...
GUEST RESEARCH: The cyber threat landscape saw an unprecedented surge in web-based distributed denial-of-service (DDoS) attacks in 2024, with incidents spiking by 550% compared to the previous year, according ...
8th Annual Year in Review Names Two New OT Cyber Threat Groups, Ongoing Infiltration by VOLTZITE, and Global Threat from FrostyGoop Malware
COMPANY NEWS: Dragos, the global leader in cybersecurity for ...
GUEST RESEARCH: Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the manufacturing sector. As manufacturers increasingly ...