Nearly a quarter of exploits sold on the cybercriminal underground are more than three years old
"Criminals know that organisations are struggling to prioritise and patch promptly."
Encrypted chat apps doubling as illegal marketplaces
Encrypted chat apps are doubling as illegal marketplaces as criminals utilise them to sell illegal goods without fear of content moderation.
5G flaws allow criminals to steal data, cut access to the web
"There is a risk that attackers will take advantage of standalone 5G networks while they are being established and operators are getting to grips with potential vulnerabilities."
Top cyber threats for Australia in 2020
COVID-19 scams, ransomware attacks, mobile adware and fleeceware, stalkerware and deepfakes were the top cyber threats that impacted Australian and global businesses in 2020.
More than just malware, ransomware 2.0 hits businesses hard
Cyber criminals are shifting their focus from encrypting data to publishing confidential information online, according to new findings from Kaspersky researchers.
Report: Majority of New Zealanders exposed to cyber crime
It's not enough to simply have anti-virus software installed on a laptop anymore.
Scammers using Bitcoin, sextortion to take advantage of Coronavirus fears
As people's fear and desire to do something about COVID-19 is dominating the news, it is also being exploited in every way by online criminals.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Opinion: Why agility matters in the war against cybercrime
Endace's EMEA senior director shares why agility is fundamental to cybersecurity, enforcing that if it isn't top of the agenda, it should be.
What do cybercriminals spend their money on? Sex, drugs & toilet roll
Cybercriminals in Bromium's report were earning up to £1.4m a year and had a number of fascinating spending habits.
Data centres beware: New report predicts imminent attacks
Cryptomining is increasingly outdoing ransomware in popularity but cybercriminals are running out of CPU, painting data centres as prime targets.
Expert: Farce involving Russia’s US elections breach needs resolving
Multiple US officials have announced the intelligence community had evidence that states had been compromised by Russia but didn't tell anyone.
Cybercriminals likely to attempt GDPR extortion for greater ROI
Trend Micro says cybercriminals are becoming more business-minded and are likely to target organisations that are trying to comply with GDPR.
Threat Spotlight: New widespread, 'unstoppable' phishing attack
Barracuda looks into a new phishing attack that impersonates popular web services to entice victims into giving away their credentials.
Hacking of national security projects highlights importance of patching
The recent release of the Australian Cyber Security Centre (ACSC) 2017 report revealed a small breach – with massive implications.
Warnings issued: ‘Hackable’ hospital syringes could be fatal
A skilled cybercriminal can hack the automated syringe from anywhere in the world to take over and control it to adjust dosages. Is the IoT worth it?
Expert spells out how businesses can 'block the spears'
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Once prominent infection method now declining - short blip or for good?
An expert from Digital Shadows dissects the once prominent method of infection known as exploit kits and whether they remain a threat.
New report reveals hackers weaponising old vulnerabilities
Attacks are on the rise and cybercriminals are reverting to old techniques, with Akamai using the quote “everything old is new again."
Two dark web markets shut down but expert says ‘one door closes, a window opens’
“You can bet that as you’re reading this, those engaged in cyber crime on the dark web are looking for that next ‘market place window’ to open."
Want to cause chaos? ICIT says hacking elections is easy
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Malware found prowling within every app of alternative Android store
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Cisco reveals alarming findings from Midyear Cybersecurity Report
“As recent incidents like WannaCry and Netya illustrate, our adversaries are becoming more and more creative in how they architect their attacks.”
Digital Shadows discovers credit card crime ring cashing in on $24b a year
A professional ecosystem has emerged that is providing e-learning courses to allow aspiring cybercriminals to make USD$12k in monthly earnings.