SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news

Penetration testing news stories

Story image
Cybersecurity
Ethical hacking in Aotearoa: How can it benefit cybersecurity in NZ?
Negative connotations have traditionally been applied to the term 'hacking'. But with cyber-threats ramping up, things are changing fast — and CISOs can't afford to keep the status quo.
Story image
Penetration testing
Interview: Blacklock Security pioneers pentesting as a service in Asia Pacific
We spoke to Blacklock's Nilesh Kapoor about Blacklock, a startup that is making waves in the penetration testing as a service space.
Story image
Cybersecurity
Huge increase in threat actors using Cobalt Strike - Proofpoint research
Proofpoint cybersecurity company has released research finding a 161% increase in threat actors using the threat emulation tool Cobalt Strike.
Story image
Digital Transformation
HackerOne launches penetration testing to empower digital transformation
“In today’s agile environments, pentest platforms should seamlessly integrate with every aspect of the software development lifecycle so that findings are quickly pushed to the right developer and vulnerabilities are fixed faster."
Story image
Malware
Equifax breach vulnerability surfaces as top network attack in Q3 2019
WatchGuard’s latest Internet Security Report also reveals significant increases in malware and network attacks, as zero day malware accounts for 50% of all detections.
Story image
Cloud
Trustwave introduces dashboard to manage security testing
Through point-and-click navigation, users can scan business-critical applications to search for unpatched vulnerabilities, exploitable code or evidence of malicious activity.
Story image
Distributor
Orca Tech onboards auto penetration testing company
The cybersecurity and analytics VAD has formed an agreement with the Israeli company Pcysys.
Story image
Penetration testing
Security defensive blue teams failing to catch offensive red teams - Exabeam
35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often.
Story image
Cybersecurity
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
Story image
Cybersecurity
Search and destroy: Secure your web apps with zero false-positives
ImmuniWeb On-Demand is a perfect choice for one- time application security and privacy testing.
Story image
Social Media
Trustwave releases facial recognition tool for pentesters
Social Mapper takes an automated approach to searching popular social media sites for names and pictures of individuals.
Story image
Cybersecurity
Singapore IMDA launches GoSecure cybersecurity programme for Singapore ICT firms
According to IMDA, the programme will benefit 200 Singapore-based ICT companies over the two-year period.
Story image
Blockchain
Brisbane cybersecurity startup protects $1 billion worth of ICO funding from hackers
Entersoft’s ‘one stop shop’ approach to cybersecurity has paid off to the tune of $1 billion worth of initial coin offerings.
Story image
Network Security
What cyber security needs to go beyond the network
Forward thinking companies are going beyond penetration testing to employ a more holistic approach to cyber security.
Story image
Cloud Services
APAC to be the fastest-growing region for security assessment services
Asia Pacific will be a hotspot for security assessment vendors as it becomes the fastest growing region in the world between 2017-2022.
Story image
Law
In depth: A lawyer's perspective on ethical hacking & penetration testing in Asia
What is‘ethical hacking’ in an organisation and are there any grey areas in the law? We sat down with RHTLaw Taylor Wessing’s Jack Ow to find out.
Story image
DevOps
Interview: Sense of Security talks red teaming, DevSecOps and 'box ticking'
"In some cases, we’ve simply walked in and plugged a device straight into the network with little to no resistance."
Story image
Broadband
RIoT Solutions ramps up security capabilities to match business growth
“The move to smart, connected networks puts us in a strong position to grow our business as demand for secure IoT connectivity increases."
Story image
Artificial Intelligence
Equifax breach indicates need to evolve cyber security thinking
The Equifax breach has underlined the problem with security testing.
Story image
Law
The legal impact of data protection and management in the digital age
As organisations look towards data to track patterns, they should also be mindful of the legal regulations that govern data protection and breaches.
Story image
Multi-factor authentication / MFA
Identity theft - have you ever pen tested procedures?
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.
Story image
Training
RIoT Solutions security team snaps up 'gruelling' OSCP certification
RIoT Solutions’ security team has proven that its up to scratch in their cyber expertise, after three of its top experts gained OSCP Certification.