Sensitive Information stories
i-PRO shares key tips on data privacy protection
Security solutions firm i-PRO underscores the importance of data privacy in a world increasingly under surveillance.
Flare uncovers cyber threat landscape by Russian hackers
Cybersecurity firm Flare exposes the escalating threat posed by initial access brokers on Russian hacking forums.
Securing APIs in 2024: Top challenges for CISOs
In 2024, securing APIs emerges as a critical task for CISOs, with 92% of organisations experiencing breaches due to increasing API adoption and sophisticated AI-powered hacking techniques.
The role of Privilege Access Management in achieving robust cybersecurity
Privilege Access Management (PAM), with its ability to control key digital accounts, is proving crucial in combating rising cybersecurity threats posed by misuse of digital identities, a key source of business disruption.
Data Privacy Day sees phishing risk surge – report
Ahead of Data Privacy Day, PrivacyEngines stresses increasing threat of phishing, with a staggering number of global attacks in Q3 2022.
CybeReady introduces new QR code phishing simulations
CybeReady has introduced QR Code Phishing Simulations to its training suite, to arm businesses against the rising trend of quishing.
ReasonLabs uncovers cashback scam in torrented video game files
Cybersecurity firm ReasonLabs exposes massive cashback scam in torrented video games, compromising user's personal information.
AI advancements being exploited for email cyberattacks
Cybercriminals are capitalising on the advancements in generative AI technology to conduct sophisticated email cyberattacks, says CISO of Abnormal Security.
SendQuick achieves top security certifications, reinforcing user data protection
SendQuick earns ISO/IEC 27017:2015, ISO/IEC 27018:2019 and Cyber Trust Mark, bolstering user data security.
Cybercrime threat escalation prompts vigilance for Black Friday shoppers
Alarming data shows cybercriminals escalating efforts to exploit Black Friday, with a 135% increase in fake retail sites.
Threat actor targets developers with malicious Python packages
Python developers targeted by malware disguised as obfuscation tools, granting attackers full control over victims' systems.
ConnectID brings digital identity solutions to Australian recruitment sector
ConnectID partners with Referoo, offering real-time, secure digital identity verification to the Australian recruitment sector.
'UK's crucial infrastructure under major threat from cyber attacks' report reveals
The National Cyber Security Centre's annual review reveals a sustained and significant cyber threat to the UK's crucial infrastructure.
Malicious Python packages form serious security threat, Checkmarx study reveals
Checkmarx study uncovers serious security risk posed by malicious Python packages used to hijack victim's computers.
Group-IB warns of rising Android Trojan threat in APAC
Group-IB warns of rising cyber threats in Asia-Pacific, with advanced Android Trojan GoldDigger targeting Vietnamese banking apps.
archTIS product wins Policy Mgmt Solution of the Year award
archTIS Limited's NC Protect earns Policy Management Solution of the Year at the CyberSecurity Breakthrough Awards.
CMTG highlights IT threats during Cyber Security Awareness Month
Perth-based cyber security firm, CMTG, warns Australians of significant daily online threats amidst Security Awareness Month.
MongoDB announces general availability of encryption technology
MongoDB has unveiled MongoDB Queryable Encryption, a technology that safeguards sensitive data when it is queried and used on the platform.
Joshua Goodman named Regional Sales Manager
Varonis appoints Joshua Goodman as Regional Sales Manager for NSW, QLD, ACT, and NZ. He brings a decade of experience in B2B software account management.
Are Kiwi firms exposing sensitive data to help desks?
A New Zealand IT specialist is warning Kiwis phoning cloud software helpdesks that they may expose their data to unnecessary risk.
Juniper targets mobile threats
Consumer and business smartphone use being targeted for the Pulse Mobile Security Suite.
Security requirements and strategies apply to unifi ed communications solutions just as much as they do to traditional phone and email systems.