Displaying items by tag: Security

COMPANY NEWS: Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks.

Published in Security

March 31st is World Backup Day – the annual reminder of the importance of backing up and protecting data from loss and theft.  The universal messages of making regular backups, keeping offline copies and more are as important as ever – but in an increasingly digital, cloud enabled world and with a rapidly evolving threat landscape, there are other aspects of effective backup that are worth thinking about on World Backup Day. They may not be as obvious, but they are just as important. 

Published in Security

GUEST OPINION:  The emergence of Chinese AI start-ups such as DeepSeek and a review of Australia’s own sovereign AI and cybersecurity capabilities are gaining more political attention in the lead up to this year’s federal election.

Published in Guest Opinion

GUEST RESEARCH:  When new technologies such as generative artificial intelligence (GenAI) emerge, cybercriminals inevitably look for ways to exploit its capabilities for malicious purposes. While most mainstream GenAI models have built-in safeguards to prevent misuse, Tenable Research has found that DeepSeek R1 can be tricked into generating malware, raising concerns about the security risks posed by AI-powered cybercrime.

Published in Guest Research

F5 BIG-IP Next Cloud-Native Network Functions deployed on NVIDIA BlueField-3 DPUs turbocharge data management and security, unlocking new edge AI innovations and driving the future of AI-RAN

Published in Data

GUEST OPINION:  Attacks on software supply chains are becoming an increasing concern for security teams around the world. These attacks can cause significant disruption or financial losses for those targeted.

Published in Guest Opinion

COMPANY NEWS:  Exabeam Secures Top Honors in SIEM, AI Security Solution, and Most Innovative Cybersecurity Company

Published in Company news

CyberArk (NASDAQ: CYBR) and  Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, automated access management and device lifecycle protection.

Company's SIEM Solution, Log360, Evolves Into a Unified Security Platform; Helps Simplify Security Operations and Future-Proofs Security Investments

  • Log360 transforms security operations from a cost centre to a strategic asset
  • Open APIs and community-driven innovation ensure rapid response to emerging threats while reducing total ownership costs
  • Partnership forged with Sacumen, a specialist cybersecurity firm, to build connectors
  • Learn more about the unified security capabilities of the Log360 platform at https://mnge.it/log-management
Published in Security

The Mongolian Tax Administration (MTA), responsible for tax administration, revenue collection, and compliance enforcement for a population of approximately 3.5 million people, has significantly improved its data management and operational efficiency through the adoption of Cloudera for data, analytics, and AI.

Published in Data

Survey reveals urgent need for prioritisation of network and security architecture transformation and adoption of a Zero Trust ‘Resilient by Design’ approach for cyber resilience strategies in the face of inevitable future attacks

  • 75% of Australian organisations expect to experience a significant failure scenario in the next year.
  • 97% of Australian IT leaders ‘believe’ their current cyber resilience measures are effective, yet ransomware attacks continue to rise and cost organisations billions of dollars per year.
  • But only 32% say their cyber resilience strategy is up-to-date in preparation for modern attacks in response to the rise of AI
  • Australian organisations must more closely examine their ability to respond to advanced cyber breaches, which allow threat actors to access systems, move laterally, and steal sensitive data.
Published in Security

Australian companies need to establish clear ransomware policies and improve their understanding of their attack surface to enhance their cyber security, says a visiting global expert.

Published in Security

AI continues to be a force multiplier for good, aiding cybersecurity protections, while also enabling bad actors to harness the technology in their attack vectors.

Published in Data

Motorola Solutions’ PSCore mobile app expanded to help identify vehicles of interest

Western Australia Police Force is conducting faster and better-informed investigations and road policing throughout the state through the addition of automatic number plate recognition (ANPR) capability within Motorola Solutions’ PSCore mobile application.

Published in Security

GUEST RESEARCH:  Building managers are reporting the use of AI to help them enhance operational efficiencies with streamlined maintenance, upgraded security and optimised energy usage

Published in Guest Research

Check Point Software Technologies Ltd (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that Adelaide-based Southern Cyber, a leading provider of cyber security solutions, has reinforced its commitment to delivering world-class cyber security by implementing a prevention-first strategy.

Published in Security

ThreatX Protect Addresses Critical Need to Protect Against Evolving Application and API Security Threats

Published in Deals

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments