24 March 2022

Types of Penetration Testing

In today’s corporate environment, there is no doubt that security is now one of the main issues being addressed. Literally every day, you hear about Cyber hackers attacking into computer systems and serves, stealing everything from passwords to financial information and data. No matter how hard the management and IT teams at these businesses try to combat these types of security breaches, the hacker is always one step ahead. In fact, this can be very much likened to that of a cat and mouse game.

Read More
24 January 2022

Your Guide to Sandboxing: What It Is, Its Benefits, and How You Can Use It to Protect Your Virtual Environment

Cyber threats are becoming more complex. Compared to their milder predecessors, they are now a more significant threat that affects millions worldwide. Nowadays, cyber threats are a legitimate cause for concern—when left unchecked, they can negatively affect your operations, finances, and even your reputation. Data breaches and hacking incidents have affected not only individuals but …

Read More
21 January 2022

What You Need to Know About Intrusion Detection Systems

The latest IBM Cost of a Data Breach report shows that the past year registered the highest data breach costs in the 17-year history of its reporting. Widely affected by remote work and compromised credentials, these costs were pegged at USD 4.24 million. This trend shows the massive impact of cyberattacks and threats to enterprises …

Read More
20 January 2022

A Close Look at Endpoint Detection and Response

The growing dependency of many businesses on technology for important tasks opens a lot of opportunities for consumers, but it also opens doors to cyberattacks. The advanced technologies that have made life easy for us have also made it easy for unscrupulous minds to do their dirty work. The good news is that many companies …

Read More
4 January 2022

SOAR: How It Works and How It Can Benefit Your Security Operations

Cyber security is a crucial aspect of operations. It refers to strategies and technologies that protect systems and data, including sensitive data, intellectual property, and personally identifiable information (PII), from security issues, such as theft, unauthorised use, and damage. Now, more than ever, the world is facing threats from security incidents. Cyberattacks are becoming more …

Read More
4 January 2022

Tailgating: Examples, Risks and Defence Tips

Cybercriminals are getting smarter with the passage of time. They’re finding new ways to exploit and gain access to business computer systems. One of their evolving tactics is social engineering, a technique that involves the manipulation of human behaviour. Hackers trick another person, so they can gain confidential, personal data that they can use for …

Read More
4 January 2022

SIEM: How It Works and Selection Tips

With one cyber-attack happening in Australia every eight minutes, there’s never been a more crucial time for organisational systems to adopt robust solutions for quickly identifying and responding to suspicious IT activity. Attackers only need to find one security loophole in a network of security devices to be able to halt the operations of a …

Read More
29 November 2021

Understanding Identity and Access Management

As businesses and commercial enterprises undergo extensive digital transformation, the importance of having a reliable identity management system in place should not be taken for granted. The move towards increased accessibility at various customer touchpoints and employee work hubs poses security risks. In some industries, identity and access management systems are mandatory and are required …

Read More
28 November 2021

Cyber Security 101: Cyber Vulnerabilities and Attacks in the Digital Space

Nowadays, many organisations and companies have migrated their processes and systems to the digital space. Digital transformation has become a crucial part of scaling and managing businesses, and it has become almost impossible to go about daily work tasks without using a mobile device. Team members use their devices to connect and facilitate work, allowing …

Read More
27 November 2021

Cyber Security Incident Response Plan

What It Is, Why It’s Important, and How You Can Build One for Your Business Cyber security threats in Australia abound despite measures implemented by organisations and governmental authorities, such as the Australian Cyber Security Centre (ACSC), Defence Intelligence Organisation (DIO), and the Australian Criminal Intelligence Commission (ACIC). The ACSC’s Annual Cyber Threat Report for …

Read More
29 October 2021

What Is Phishing? Everything You Need to Know

Phishing is one of the most pervasive cybersecurity problems. Believe it or not, phishing attacks have been around since the early days of the internet. The first recorded phishing attempt was conducted by a group of hackers in the mid-1990s. They used the America Online service to steal log-in details and credit card information from …

Read More
28 October 2021

What is Data Security? Everything You Need to Know About Data Security

Cyberattacks are an ever-present threat. Anyone can fall prey to cyberattacks, from small businesses to government agencies. During the 2020-2021 financial year, the Australian Cyber Security Centre (ACSC) received over 67.500 cybercrime reports, indicating an increase of around 13% compared to last year. This equates to one report every 8 minutes, with a large number …

Read More
25 October 2021

The State of Cloud Security and Issues to Watch Out For

Many companies have migrated to cloud-based technologies in the past year due to stiff competition and the high demand for business-critical applications to be accessible in the face of remote working. In Australia alone, 55% of businesses have incorporated paid cloud models into their budgets from 2019 to 2020. Figures indicated that the larger the …

Read More
7 September 2021

Everything You Need to Know About Malware Protection

Malware can affect and wreak havoc on your devices at any given time. It may have iterations and its effects may vary according to its form. Malware can be used to collect and expose sensitive personal information for purposes of identity theft. It can also be used to steal financial data. With malware attacks becoming …

Read More
6 September 2021

Cybersecurity 101: Discovering the Ins and Outs of Ransomware and How to Avoid It

The digital era has optimised the way people communicate and work. Today, members of an organisation can conveniently share and access files and data from anywhere in the world. However, this also puts vital data at more risk of being accessed by unsavoury characters and being infected with malicious software. One such malicious software is …

Read More
2 September 2021

Cybersecurity 101: All You Need to Know About Cybersquatting or Domain Squatting

Ever since the dawn of the digital age, websites have become a crucial part of many businesses. Consumers across the globe head to the Internet when they want to learn more about products and services. That’s why business owners use their websites to list all the information that potential customers may want to know. The …

Read More
1 September 2021

Why Good Database Security is Important

Around 36 billion records were compromised from January to September of 2020. Nearly a billion of those records were exposed during two breaches in the third quarter of the year. According to the same report, cybercriminals are still the main drivers behind these breaches. However, misconfigured databases and services are the key factors that continue …

Read More
23 August 2021

Microsoft Power Apps Misconfiguration Exposes 38 Million Personal Records

Microsoft Power Apps misconfiguration exposes 38 million personal records A highly common misconfiguration on Microsoft Power Apps was found to have led to the exposure of 38 million personal records containing information such as COVID-19 vaccination status and social security number (SSN). Microsoft Power Apps is an online platform that provides tools for developing low-code …

Read More
16 August 2021

T-Mobile Confirms 48 Million Personal Records Breached in Cyberattack

T-Mobile confirms cyberattack compromising personal data of 48 million customers On August 15, a hacker claimed to have breached T-Mobile and stolen 106 GB of data containing the names, addresses, account login credentials, and social security numbers (SSN) belonging to 100 million customers. A sample dataset of 30 million driver’s licence numbers and SSNs were …

Read More
10 August 2021

Can AR Glasses Replace Smartphones?

Conan, the famous Japanese animation ‘Case Closed’ protagonist, is famous for wearing special glasses. These glasses not only track the location of criminals but also have infrared detection and magnification capabilities. Another famous animation Dragon Ball also features unusual glasses called ‘Scouts’. Characters wear scouts, measure the combat power of their opponents, and obtain information. …

Read More
7 August 2021

Cybersecurity Teams Explained

Most people have seen hackers or hacker groups portrayed in mainstream media and have a visual in mind of what they look like: malicious actors in dark rooms staring at a wall of screens and code. The same follows for a cybersecurity team – they’re not simply “fix-it” guys who come in to repair the …

Read More
2 August 2021

Italian COVID-19 Vaccine Booking Portal Knocked Offline in Ransomware Attack

Italian COVID-19 vaccine booking portal knocked offline in ransomware attack Italy’s Lazio regional government issued a notification on August 1 stating that it had suffered the most serious cyberattack ever. Home to the nation’s capital Rome, Lazio is the second-most populous region of Italy. According to Lazio’s President, all IT systems, including servers for the …

Read More
30 July 2021

[Security Weekly] South African Trade and Logistics Halted Due to Ransomware Attack

South African trade and logistics halted due to critical ransomware attack South Africa is facing a nationwide delay in the transports of goods after its state-owned logistics firm Transnet suffered a critical ransomware attack on July 22. Transnet operates most of the country’s ports, railways, and pipelines. Transnet sent a notice to its customers stating …

Read More
23 July 2021

[Security Weekly] US Law Firm to Fortune 500 Companies Suffers Ransomware Attack and Data Breach

US law firm to Fortune 500 companies suffers ransomware attack and data breach Campbell Conroy & O’Neil, P.C, a US corporate law firm whose clients include some of the world’s biggest corporations, disclosed a ransomware attack incident that happened back in February, which may have led to the compromise of sensitive personal data. Some of …

Read More
16 July 2021

[Security Weekly] Fashion Retailer Guess Hit By Ransomware, Personal and Financial Data Compromised

Fashion retailer Guess hit by ransomware, personal and financial data compromised US-based fashion retailer Guess announced a data breach where the personal and financial data of more than 1,300 employees and contractors were compromised in a ransomware attack back in February. In a data breach notification letter sent to the Maine Attorney General, Guess disclosed …

Read More
9 July 2021

[Security Weekly] Kaseya Exploited by REvil for Supply-Chain Ransomware Attack, 1,500 Firms Breached

Kaseya exploited by REvil for supply-chain ransomware attack, 1,500 firms breached Kaseya–an IT management vendor that sells SaaS and on-premises software to managed service providers (MSP), who then use the software to provide IT management services to SMEs–became the entry point of the latest supply chain attack. On July 2, the REvil ransomware gang exploited …

Read More
2 July 2021

[Security Weekly] Microsoft’s Customer Support Tools Compromised by Nobelium

Microsoft’s customer support tools compromised by Nobelium for targeted attacks Microsoft officially announced that the Russian state-sponsored hacking group Nobelium, also known as APT29, had gained access to a customer support agent’s computer, leading to subsequent cyberattacks targeting Microsoft customers. A highly sophisticated hacking group, Nobelium is infamous for being behind the SolarWinds supply chain …

Read More
25 June 2021

[Security Weekly] Carnival Cruises Disclose a Fourth Data Breach Over a Period of 15 Months

Carnival cruises disclose a fourth data breach over a period of 15 months Carnival Corporation & plc, the world’s largest travel company that operates some of the major cruise lines, disclosed another data breach incident that affected the Carnival Cruise Line, Holland America Line, and Princess Cruises, making it the fourth data breach incident the …

Read More
19 June 2021

[Security Weekly] VW and Audi Expose 3.3 Million Personal Records Due to Vendor Mistake

Volkswagen and Audi expose over 3.3 million personal records from North America Volkswagen and its subsidiary Audi announced that over 3.3 million personal records of their  North American customers and potential buyers were accidentally exposed by an undisclosed third-party vendor. The vendor serves both companies and their authorized dealers in the United States and Canada. …

Read More
11 June 2021

[Security Weekly] Gaming Giant EA’s Source Code and Debug Tools Stolen from Cyberattack

Video game giant Electronic Arts suffers cyberattack compromising source code Electronic Arts (EA), one of the largest gaming companies in the world and the publisher of popular games like the FIFA series, Battlefield, and The Simpsons, suffered a cyberattack that compromised over 780 GB of data, mostly consisting of source code and debug tools. The …

Read More
4 June 2021

[Security Weekly] World’s Largest Meat Distributor JBS Shuts Down Operations After REvil Ransomware Attack

World’s largest meat distributor suspends operations after REvil ransomware attack

Read More
Cofence
ThreatX logo
Crowdstrike
thycotic
fortinet
zscaler
Rapid7
SentinelOne
netskope
ExtraHop
cyberfish
Qualys
Logpoint
IBM
mimecast
Cisco