How Azure Active Directory opens new authentication risks
Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes.
Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes.
Ransomware gangs seem to be exploiting concerns over disruptions in the energy and other critical infrastructure sectors.
The Nitrokod cryptocurrency mining campaign goes to great lengths to avoid detection and can remain active for a number of years.
Hackers have developed ways to bypass multi-factor authentication on cloud productivity services like Microsoft 365, formerly Office 365.
A new strain of ransomware has been making victims for the past two months, masquerading as a Google software update application.
Researchers demonstrate a proof of concept where hijacked programmable logic controllers can compromise engineering workstations to allow lateral movement.
Two research groups demonstrate PC firmware vulnerabilities that are difficult to mitigate and likely to be exploited in the wild.
The TA428 group has been successful by targeting known vulnerabilities and using known detection evasion techniques.
The sophisticated rootkit malware infects system firmware to avoid detection and has claimed victims in China, Iran, Vietnam and Russia.
At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues".
Unlike other speculative execution attacks like Spectre, Retbleed exploits return instructions rather than indirect jumps or calls.
The phishing web pages that this adversary-in-the-middle phishing campaign uses act as a proxy and pull content from the legitimate Office 365 login page.
APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.
The ZuoRAT remote access Trojan malware can compromise multiple router brands and likely has been active for years.
A new research project from OT:ICEFALL has uncovered 56 vulnerabilities in operational technology (OT) devices from 10 different vendors.
Join key decision-makers within Environmental, Social, and Governance (ESG) that have the power to affect real change and drive sustainable practices. SustainTech will bridge the gap between ambition and tangible action, promoting strategies that attendees can use in their day-to-day operations within their business.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO for IBM Australia, Southeast Asia, New Zealand & Korea (ASEANZK)
The roadmap to a low carbon future in technology The IT sector accounts for 2% of global greenhouse gas emissions1. This will rise as data and new technologies increasingly play a central role in shaping organisational operations. As enterprises and governments introduce net zero or decarbonisation targets, IT operations will need to better understand their emissions and how they can be reduced without negatively impacting technology or business operations. SustainTech will bridge the gap between ambition and tangible action, promoting Environmental, Social and Governance (ESG) strategies that attendees can use in their day-to-day operations within their business.
16 November 2023