Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Password vulnerability fixed in Dell storage firmware

Password vulnerability fixed in Dell storage firmware

Failed to block brute force attacks.
Staff Writer May 3 2022 6:22AM Security
India mandates data breach notification within six hours

India mandates data breach notification within six hours

Also requires VPN customer registration.
Richard Chirgwin May 2 2022 12:13PM Security
Microsoft fixes Azure PostgreSQL cross-account database access bug

Microsoft fixes Azure PostgreSQL cross-account database access bug

"ExtraReplica" tenant bypass not exploited.
Juha Saarinen Apr 29 2022 5:51AM Security
Patch now against Linux 'Nimbuspwn' root priv-esc bugs

Patch now against Linux 'Nimbuspwn' root priv-esc bugs

Microsoft code review finds multiple vulnerabilities.
Juha Saarinen Apr 28 2022 11:55AM Security
SA gov to create bug bounty program

SA gov to create bug bounty program

Looks to replace “ad hoc” vulnerability reporting from July.
Justin Hendry Apr 28 2022 11:44AM Security
CBA staff mastering cyber security in UNSW pilot

CBA staff mastering cyber security in UNSW pilot

SECedu program a gateway to a full masters.
Richard Chirgwin Apr 28 2022 10:57AM Security
BT and Toshiba trial commercial quantum-secured network

BT and Toshiba trial commercial quantum-secured network

With EY.
Staff Writer Apr 27 2022 12:13PM Security
US puts million dollar bounties on Russian hackers' heads

US puts million dollar bounties on Russian hackers' heads

Seven Russian intelligence officers sought.
Juha Saarinen Apr 27 2022 7:07AM Security
NSW gov struggles to find its 'cyber army'

NSW gov struggles to find its 'cyber army'

Skills shortage slows Cyber Security NSW expansion efforts.
Justin Hendry Apr 26 2022 12:35PM Training & Development
Google's VirusTotal service vulnerable for over eight months

Google's VirusTotal service vulnerable for over eight months

Remote code execution and lateral network movement possible.
Juha Saarinen Apr 26 2022 11:38AM Security
Atlassian patches auth bypass in Seraph

Atlassian patches auth bypass in Seraph

Third-party apps also affected.
Richard Chirgwin Apr 22 2022 11:05AM Security
When AWS fixed Log4Shell, it created new vulnerabilities

When AWS fixed Log4Shell, it created new vulnerabilities

Container escape, privilege escalation.
Richard Chirgwin Apr 22 2022 6:49AM Security
Five-Eyes alliance issues Russian cyber attack alert

Five-Eyes alliance issues Russian cyber attack alert

Russia's finger hovers over internet "off-switch".
Juha Saarinen Apr 21 2022 11:53AM Security
Java 15 introduced a cryptographic vulnerability

Java 15 introduced a cryptographic vulnerability

One of 500+ in Oracle's April patch-fest.
Richard Chirgwin Apr 20 2022 12:57PM Security
Record number of same-old zero days detected in 2021

Record number of same-old zero days detected in 2021

Only two could be described as novel, Google's Project Zero said.
Juha Saarinen Apr 20 2022 6:51AM Security
Videoconferencing apps can access muted mics

Videoconferencing apps can access muted mics

Webex tweaked to stop collecting audio from muted users.
Richard Chirgwin Apr 20 2022 6:43AM Security
Stolen Heroku and Travis-CI OAuth tokens used for GitHub repo hacks

Stolen Heroku and Travis-CI OAuth tokens used for GitHub repo hacks

Data downloaded from npm and other organisations.
Juha Saarinen Apr 16 2022 7:42PM Security
Cisco offers a bumper haul of vulnerability fixes

Cisco offers a bumper haul of vulnerability fixes

Spring4Shell still keeping engineers busy.
Richard Chirgwin Apr 14 2022 11:02AM Security

Log In

  |  Forgot your password?