SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news

Exploits news stories

Story image
Cybersecurity
Infoblox's State of Security Report spotlights Australian remote work hazards
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Malware
Use of malware, botnets and exploits expands in Q1 2022
"As zero-day attacks and other vulnerabilities among companies like Google and Microsoft come to light, threat actors are quickly adjusting their tactics."
Story image
Cybersecurity
WordPress vulnerabilities more than doubled in 2021
WordPress vulnerabilities more than doubled in 2021, and 77% of them are exploitable.
Story image
Firewall
Log4j actively exploited, serious complications can occur according to CERT NZ
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Security vulnerabilities
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Story image
Exploits
Radiflow launches iRISK for greater visibility into risk and vulnerability
Radiflow, the company that provides cybersecurity solutions for industrial automation networks, has launched a business driven industrial risk analytics service known as iRISK.
Story image
Microsoft
US$250,000 up for grabs with Microsoft’s bug bounty
Microsoft has announced the Speculative Execution Side Channel Bounty Program that is offering up to USD$250,000 to people who reveal novel bugs.
Story image
Cisco
Cisco ASA appliances at risk of denial of service exploit
The Australian Cyber Security Centre (ACSC) has issued an official alert to those who use Cisco’s Adaptive Security Appliance (ASA).
Story image
Adobe
North Korean threat group suspected to be behind Adobe Flash exploit
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Story image
Ransomware
Fool me once... ransomware strikes firms twice on average, survey finds
“Ransomware is not a lightning strike – it can happen again and again to the same organisation."
Story image
Content Creation
Cybersecurity firm Votiro joins VMware's TAP program
Israeli-based cybersecurity firm Votiro has joined VMware’s Technology Alliance Partner Program as an access level partner.
Story image
Kaspersky
ShadowPad exploit ‘one of the biggest’ APAC supply chain attacks
Several recent versions of NetSarang Server Management software were compromised by the ‘ShadowPad’ exploit.
Story image
Firewall
WatchGuard report: 30% of all malware isn’t caught by legacy AV
WatchGuard’s Quarterly Internet Security Report says that 30% of malware attacks are new or zero day exploits - and legacy AVs are missing threats.
Story image
Malware
March saw rise in web attacks; but email malware and spam drop back
Symantec reports back on the latest threat statistics for March - email malware dipped, but web attacks are the biggest since 2016.
Story image
Android
Google’s hacking contest ‘Project Zero’ was a flop: What went wrong?
Not a single person claimed Google’s Project Zero prizes, even after six months of being open to participants.
Story image
Ransomware
APAC is now a 'honeypot' for cyber attacks as most targeted region in the world
Trend Micro’s latest report says that Asia Pacific region was something of a giant honeypot for cyber attacks last year, beating all other regions.
Story image
Security breaches
With ever-shifting sands, knowledge is the ultimate power in cyber security
Hackers are conducting "reconnaissance" to find prosperous neighbourhoods to attack, then they "scan" the individual system to test for easiest entry.
Story image
Surveillance
Siemens-branded CCTV webcams require urgent firmware patch
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.