Cyber espionage group APT29 is adapting its tactics for cloud environments. Here’s what you should know.
Cyber espionage group APT29 is adapting its tactics for cloud environments. Here’s what you should know.
One vulnerability impacting ConnectWise ScreenConnect that allows remote attackers to bypass authentication to create admin accounts is being used in the wild.
Tips for mitigating the risks associated with these cyberattacks, which include cloud-environment intrusions, are provided.
The outing of China-backed threat actor Volt Typhoon and Microsoft’s compromise by Russia-backed Midnight Blizzard provide important cyber security strategy lessons for Australia, says Tenable.
Deepfakes are at the top of the list of the concerns in the ISC2 AI survey, which polled cybersecurity professionals on the real-world impact of AI. Gen AI regulation is another top-of-mind subject.
Australian IT and security teams should play key roles in communications during outages and cyber attacks; they also need to be prepared to act when such a tech-related crisis occurs.
The enforcement action is a major blow against the ransomware-as-a-service provider, which has been connected to 2,000 victims globally.
Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it.
In this Q&A, Godfrey reminds business leaders to integrate security into conversations around financial and business targets.
New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked.