7 best practices for enterprise attack surface management
Follow this advice to minimise vulnerabilities and give threat actors fewer opportunities to compromise an organisation's network and devices.
Follow this advice to minimise vulnerabilities and give threat actors fewer opportunities to compromise an organisation's network and devices.
After operating under other names, Fancy Lazarus has fine-tuned its DDoS extortion campaigns, although with mixed results.
As savvy CISOs know, a well-crafted and well-timed cyber threat report can help executives grasp what’s happening in the world of cyber security.
DarkSide attack on Colonial is yet another wake-up call for companies to harden systems but history suggests that might not happen.
Though lacking in clarity, this new executive order might be more effective than past efforts, especially in the wake of the Colonial pipeline attack.
Experts weigh in on what the Colonial attack teaches critical infrastructure providers about preparation and incident response.
Security start-ups are often innovation leaders that attempt to solve critical problems. These are some of the most interesting ones to watch.
Several Australian channel players have reaped new grants for cyber security training from the Federal Government.
Telecommunications company Hubify is launching a managed cyber security services offering ‘CyberHub’ after striking a strategic $500,000 investment in cyber security services provider Internet 2.0.
Private equity firm Thoma Bravo has built up its cyber security portfolio through purchasing Proofpoint for about US$12.3 billion.
Known and unknown groups are using VPN vulnerabilities to circumvent authentication and establish backdoors.
Old tactics in new packages lead the list of current social engineering attacks. Experts provide real-world examples.
5G networks that incorporate legacy technology could be vulnerable to compromise via a lack of mapping between transport and application layers.
The Golden Chickens cyber criminal gang is believed to sell its more_eggs backdoor for campaigns executed using information from LinkedIn profiles.
The trial of Xiaorong You has now started, a research engineer used basic exfiltration techniques to steal trade secrets from Coca-Cola.