Australian CEOs Struggling to Face Cyber Risk Realities

Australian CEOs Struggling to Face Cyber Risk Realities

Image: ImageFlow/Adobe Stock Fear and the more technical aspects of cybersecurity are still stopping Australian CEOs from engaging more deeply with cybersecurity risks, despite a string of high-profile cyberattacks that have hit Australian brands, including Optus and Medibank and millions of their customers. New research from consulting firm Accenture found that only one in five (19%) of Australian CEOs are currently dedicating board meetings to discussing cybersecurity issues, while 34% think cybersecurity isn’t a strategic…

Read More

Valentine's Alert: Don't Let Scammers Break Your Heart or Your Bank Account | McAfee Blog

Valentine's Alert: Don't Let Scammers Break Your Heart or Your Bank Account | McAfee Blog

As with any major holiday or special occasion, Valentine’s Day is unfortunately not immune to scammers looking for an opportunity to exploit unsuspecting individuals. Their deceitful acts can break hearts and bank accounts. In this article, we spotlight some common Valentine’s Day scams, offer tips on how to protect yourself and navigate this romantic day with confidence and caution. The Unromantic Side of Valentine’s Day Valentine’s Day is a time when love is in the…

Read More

CISO perspective on breach disclosure 1 year after Sullivan conviction

CISO perspective on breach disclosure 1 year after Sullivan conviction

CISO perspective on breach disclosure 1 year after Sullivan conviction | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software

New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software

Sep 27, 2023THNMalware / Cyber Threat A new malware strain called ZenRAT has emerged in the wild that’s distributed via bogus installation packages of the Bitwarden password manager. “The malware is specifically targeting Windows users and will redirect people using other hosts to a benign web page,” enterprise security firm Proofpoint said in a technical report. “The malware is a modular remote access trojan (RAT) with information stealing capabilities.” ZenRAT is hosted on fake websites…

Read More

85% of IT anticipate leaving their role due to burnout

85% of IT anticipate leaving their role due to burnout

85% of IT anticipate leaving their role due to burnout | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

Sep 20, 2023THNMalware Attack / Cyber Threat Chinese-language speakers have been increasingly targeted as part of multiple email phishing campaigns that aim to distribute various malware families such as Sainbox RAT, Purple Fox, and a new trojan called ValleyRAT. “Campaigns include Chinese-language lures and malware typically associated with Chinese cybercrime activity,” enterprise security firm Proofpoint said in a report shared with The Hacker News. The activity, observed since early 2023, entails sending email messages containing…

Read More

Embracing a company culture of cybersecurity starts at the top

Embracing a company culture of cybersecurity starts at the top

Embracing a company culture of cybersecurity starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Air-gapped advantages in a non-air-gapped world

Air-gapped advantages in a non-air-gapped world

Air-gapped advantages in a non-air-gapped world | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Understanding the impact of cyberattacks on small businesses

Understanding the impact of cyberattacks on small businesses

Understanding the impact of cyberattacks on small businesses | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Is the “human factor” in security breaches over blown?

Is the “human factor” in security breaches over blown?

Is the “human factor” in security breaches over blown? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 4 5 6 25