Australia
Australia Proposes Security Law to Protect Critical Infrastructure Against Cyber Attacks
The Australian Government is committed to protecting the essential services all Australians rely on by uplifting the security and resilience of critical infrastructure. Increasingly interconnected and interdependent critical infrastructure is delivering efficiencies ...
Netwalker Ransomware Operators Want $4.5 Million from Data Center Giant Equinix
The infamous Netwalker hacking group this week breached the security layers of data center giant Equinix and encrypted the data of its clients. A source shared the Netwalker ransom note with BleepingComputer, ...
Everything You Need to Know About Phishing
Did you know: 96% of phishing attacks use emails as baits! What is Phishing? Phishing is a type ofContinue reading The post Everything You Need to Know About Phishing appeared first ...
Workplace Security Policy: Need of the Hour
With rapidly evolving technology, employees at their workplaces have become more and more dependent on modern technological supplements and platformsContinue reading The post Workplace Security Policy: Need of the Hour appeared first ...
5 Biggest Data Breaches of 2020 (So Far)
Number of data breaches in 2020 has almost doubled with 3,950 confirmed breaches against 2,103 recorded breaches in 2019! EverContinue reading The post 5 Biggest Data Breaches of 2020 (So Far) appeared ...
Insider Threat: The Biggest Contributor to Cyber Attacks
In 2019, a renowned cloud hosting company fell victim to a data breach. The hacker accessed over 100 million accountsContinue reading The post Insider Threat: The Biggest Contributor to Cyber Attacks appeared ...
Biggest Twitter Breach: Accounts of US High-profiles Hacked in Bitcoin Scam
“We are giving back to our community. We support Bitcoin and we believe you should too! All Bitcoin sent toContinue reading The post Biggest Twitter Breach: Accounts of US High-profiles Hacked in ...
Secure Code Review – A Necessity
What is a Secure Code Review? Secure Code Review is the process to check the code in the development phaseContinue reading The post Secure Code Review – A Necessity appeared first on ...
5 Most Notorious Malware Attacks of All Time
9.9 million malware attacks were detected in 2019 (source: 2020 Cyber Threat Report) 94% of breaches involve malware attacks, sentContinue reading The post 5 Most Notorious Malware Attacks of All Time appeared ...
Australian Beverage Manufacturer Shutdown IT Systems After Cyberattack
A cyberattack forced Australian beverage manufacturer Lion to shut down its IT system, interrupting manufacturing and orders, the company disclosed on June 9. “We immediately shut down all our systems as a ...

