Home Search

australia - search results

If you're not happy with the results, please do another search
Singtel data breach

Singtel Data Breach: 129,000 Customers including Former Employees Affected

0
The Accellion hack might have gotten overshadowed by the amount of disruption caused by the SolarWinds hack, but it surely is not lagging by...
“PerSwaysion” Phishing Campaign Targets High-Ranked Professionals Across The Globe, IKEA email reply-chain attack

Here’s Why You Are More Likely to Be Targeted with a Phishing Email

0
Threat actors constantly innovate and adopt new techniques to perform their phishing activities successfully. They often leverage compromised email IDs, login credentials, and other...
Yandex suffers insider attack

How Yandex Was Impacted by an Inside Job

0
Yandex, a popular internet company in Europe and search platform in Russia, disclosed an insider attack that affected thousands of its employees’ email systems....
106 million Thailand visitors

Compliance Standards and the Changing Nature of Data Privacy

0
As the world continues to embrace newer and better technologies like virtualization, SDN, or pure Cloud-based SaaS, coordinate values in all the 4V dimensions...
Nearly Half of Global Consumers Affected by Data Breaches

Bug in Accellion’s Software Exposes Data of 1.4 Mn Washington State Residents

0
The Office of the Washington State Auditor (SAO) is inspecting a security incident after unemployment claims data of over 1.4 million Washington state residents...
Hackers Target Office 365 Users with SurveyMonkey Phishing Campaign

Attackers are Using Fake Office 365 Pages to Phish C-Suite Executives

0
Security experts from Trend Micro uncovered an ongoing phishing campaign spreading fake Office 365 password expiration reports to compromise email accounts of C-Suite executives....
data breach

How the disposable nature of tech is putting your businesses data at risk

0
It has become common practice for people to chase the latest technology trends. As tech becomes part of our everyday life, the lifecycle of...
5g security, 5G cybersecurity

Nokia for U.S. Federal 5G Cybersecurity Project

0
Post Huawei’s ban from deploying 5G communications equipment in countries like the U.S., Australia, Taiwan, the U.K., and others, Nokia has now claimed the...
ProxyShell Vulnerabilities

Threat Actors Impersonate ACSC Officials to Scam Users

0
The Australian government is warning users about an ongoing malware campaign imitating the Australian Cyber Security Centre (ACSC). The cybercriminals are claiming to be...
effective security incident handling, incident response, incident response strategy, incident response playbook,

Effective Security Incident Handling – The Need of the Hour

0
Today, cyberattacks are getting more complex, precise, and targeted than ever before. Add to this the sheer volume of security alerts and false positives;...