Australia Proposes Security Law to Protect Critical Infrastructure Against Cyber Attacks

The Australian Government is committed to protecting the essential services all Australians rely on by uplifting the security and resilience of critical infrastructure. Increasingly interconnected and interdependent critical infrastructure is delivering efficiencies ...
Netwalker Ransomware Operators Want $4.5 Million from Data Center Giant Equinix

Netwalker Ransomware Operators Want $4.5 Million from Data Center Giant Equinix

The infamous Netwalker hacking group this week breached the security layers of data center giant Equinix and encrypted the data of its clients. A source shared the Netwalker ransom note with BleepingComputer, ...
Alert Don't Take the bait

Everything You Need to Know About Phishing

Did you know: 96% of phishing attacks use emails as baits!   What is Phishing? Phishing is a type ofContinue reading The post Everything You Need to Know About Phishing appeared first ...
workplace security policy

Workplace Security Policy: Need of the Hour

With rapidly evolving technology, employees at their workplaces have become more and more dependent on modern technological supplements and platformsContinue reading The post Workplace Security Policy: Need of the Hour appeared first ...
Data breaches 2020

5 Biggest Data Breaches of 2020 (So Far)

Number of data breaches in 2020 has almost doubled with 3,950 confirmed breaches against 2,103 recorded breaches in 2019! EverContinue reading The post 5 Biggest Data Breaches of 2020 (So Far) appeared ...
Insider Threat

Insider Threat: The Biggest Contributor to Cyber Attacks

In 2019, a renowned cloud hosting company fell victim to a data breach. The hacker accessed over 100 million accountsContinue reading The post Insider Threat: The Biggest Contributor to Cyber Attacks appeared ...
Twitter hacked

Biggest Twitter Breach: Accounts of US High-profiles Hacked in Bitcoin Scam

“We are giving back to our community. We support Bitcoin and we believe you should too! All Bitcoin sent toContinue reading The post Biggest Twitter Breach: Accounts of US High-profiles Hacked in ...
secure code review

Secure Code Review – A Necessity

What is a Secure Code Review? Secure Code Review is the process to check the code in the development phaseContinue reading The post Secure Code Review – A Necessity appeared first on ...
Malware attack

5 Most Notorious Malware Attacks of All Time

9.9 million malware attacks were detected in 2019 (source: 2020 Cyber Threat Report) 94% of breaches involve malware attacks, sentContinue reading The post 5 Most Notorious Malware Attacks of All Time appeared ...
Australian Beverage Manufacturer Shutdown IT Systems After Cyberattack

Australian Beverage Manufacturer Shutdown IT Systems After Cyberattack

A cyberattack forced Australian beverage manufacturer Lion to shut down its IT system, interrupting manufacturing and orders, the company disclosed on June 9. “We immediately shut down all our systems as a ...