Australia's leading source of security and threat news
These search results are from across the Techday network of sites
Cyber attacks on healthcare companies growing
“The potential, real-world effect cyberattacks can have on healthcare organisations and patients is substantial.”
Businesses remain unprepared despite cybersecurity risk
"The quantification of cyber risk is not easy, but this is an area where financial professionals must take the lead given cyber attacks are a constant and success almost a given."
State of the channel: A/NZ MSPs still grappling with ransomware
Issues range from SaaS infections to SMBs that don’t report ransomware attacks to the appropriate authorities, and much more.
The cyber kill chain: Moving laterally in Active Directory
Using different techniques, attackers move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
More than 40% of ICS computers were attacked in H1 2018
Cyber attacks on industrial computers are considered to be an extremely dangerous threat as they cause material losses and production downtime for a whole system.
Seven things SMBs can do right now to prevent cyber attacks
“Many think security is not their responsibility but it’s a serious risk that can destroy their business,” warns Professor Matthew Warren.
Carbon Black claims there's a link between geopolitics and cyberterrorism
“Geopolitical tensions manifest in cyberspace. There is a direct link between the failures of diplomacy and cyberespionage and cyberterrorism."
Mega users affected by credential stuffing attack; 15,000 affected
Users of file sharing website Mega have been tripped up in a credential stuffing attack.
Singapore CSA looks back at 2017's most rampant cyber threats
Last year there was a notable shift from profit-motivated attacks to attacks designed to cause disruption.
Android malware used to target North Korean defectors
A malware called RedDawn used Google Play to apparently target North Korean defectors, according to security firm McAfee.
Hong Kong, Japan, Singapore most cyber-resilient APAC nations
Cyber attacks can have an impact on stalled operations, disrupted supply chains, class-action lawsuits, and permanent brand damage.
APAC to lead market growth in botnet detection solutions and services
Asia Pacific will experience a 36% CAGR for botnet detection solutions and services, exceeding growth rates in North America and Europe.
The Pacific Cyber Security Operational Network is now in action
"PaCSON is a vehicle we can use for closer sharing of cybersecurity threat information, tools, techniques and ideas between nations."
CERT NZ honoured to chair new Pacific Cyber Security Operational Network
CERT NZ says it is a ‘huge honour’ to be voted in as the Pacific Cyber Security Operational Network’s inaugural chair.
NZ pummelled by DDoS attacks during Memcached attack outbreaks
"The attack size fell significantly between February-March from 74 to 49.4 Gbps is likely due to security teams mitigating Memcached server threats."
Bank Negara Malaysia stops SWIFT fraud in its tracks
Falsified SWIFT messages were used to attempt unauthorized fund transfers, which were blocked through a collaborative effort.
The 475-day siege: APAC firms' breach detection times are getting worse
“Defenders have to get it right every single time, while threat actors only need to get it right once.”
Check Point expands portfolio to continue fight against Gen V cyber attacks
Check Point has been busy crafting a number of security solutions for its global market in recent months.
Ericsson & Argus Cyber Security embark on security collaboration for connected vehicles
Argus Cyber Security and Ericsson will provide intelligence-based cybersecurity to connected vehicles and automakers.
Assessing the rising threat of encrypted tunnels
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
United States hot on heels of North Korea's Hidden Cobra malware
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government’s activities known as HIDDEN COBRA.
Enterprise database security the answer to complying with the POPI Act
“Single platform products don't play well when an enterprise has sensitive information in many types of databases."
NEC & Japan Govt take cyber defence training to ASEAN administration
NEC is providing cybersecurity training for ASEAN administrative staff this week.