Story image

Weekly AU security roundup: Hackers speak out, CyberArk, unpatched software and Yahoo’s CEO

03 Mar 2017

Nuix got the inside word from cyber hackers themselves about what they do, and why they do it. 50% of hackers change their attack methods for every target.   

Flexera Software and Secunia Research found that Australians are using unpatched software, many of which are at the end of their life. Unpatched Windows operating systems account for 7.5% - a jump from 6.1% in the previous quarter. What’s going on and why is it dangerous?

We talked to CyberArk Labs about privileged credentials, Australia’s data breach laws and what the ‘sprint method’ is when it comes to security - did you know they employ hackers to fight hackers? “We are trying to achieve the same sense of urgency and progress as is often done in the wake of actual breaches - without the overarching pressure of resolving a breach.”

Meanwhile, RSM Australia says that cybercrime is now the new normal, and we’d better adapt or die - fast. “Cyber security is like a house: there are many areas that need to be secured. Simply purchasing a security product doesn’t make a business safe. The underlying business environment needs to be secure. Poor foundations lead to poor security.”

Yahoo's CEO Marissa Mayer has given up her annual bonuses and passed them on to Yahoo to employees in the wake of the colossal data breaches that came to light last year. 

Carbon Black showed us how streaming prevention can detect and stop the new range of nasties: Non malware attacks.

What will next week bring? Keep checking back for daily security updates from SecurityBrief Australia.

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.