Browsing Category
Cybersecurity
CISA Advisory Details How Hackers Targeted Defense Industrial Base…
The Cybersecurity and Infrastructure Security Agency (CISA) published on Tuesday an advisory highlighting advanced persistent…
Australia’s Data Breaches Continue With Telstra’s Third-Party…
Australia's largest telecoms firm Telstra revealed on Tuesday it was hit by a "small data breach" caused by one of its third–party…
Getting Ahead Of The Latest Threat By Perception Point
By Karen Krivaa, Chief Marketing Officer
What is Perception Point?
Perception Point was founded in 2015 by three innovators who…
Ransomware Group Bypasses “Enormous” Range of EDR Tools
A notorious ransomware group has been spotted leveraging sophisticated techniques to bypass endpoint detection and response (EDR)…
Landmark US-UK Data Access Agreement Begins
A first-of-its-kind agreement between the US and UK governments came into force this week, promising to streamline digital…
New Initiative Aims to Strengthen UK’s Nuclear Cybersecurity Posture
The Chartered Institute of Information Security (CIISec) launched a new initiative this morning aimed at attracting talent,…
CISA Directive Improves Asset Visibility, Vulnerability Detection on…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new Binding Operational Directive (BOD) to improve asset…
Optus Confirms Hack Exposed Data of Nearly 2.1 Million Australians
Australian telecom giant Optus said that nearly 2.1 million of its customers suffered a leak of their personal information during…
Malicious Tor Browser Installers Spread Via Darknet Video on YouTube
Cybersecurity researchers have identified multiple infections via malicious Tor Browser installers spread via an explanatory video…
Long-Term Impacts A Data Breach Can Have on Your Business
Ways To Protect Your Business from A Data Breach
By Grant Gibson, Executive Vice President, CIBR Ready
The average data security…