Lookout discovers android spyware deployed in Kazakhstan

Sophisticated malware tooling designed to provide surveillance. Lookout, Inc., a leader in endpoint and cloud security solutions, today announced the discovery of an enterprise-grade Android surveillance ware currently used by the government of Kazakhstan within its borders. Lookout researchers also found evidence of deployment of the spyware – which Lookout…

Read More

The pandemic has reduced compliance reporting 30 per cent

Fewer observe misconduct since the pandemic. The rate of compliance reporting has dropped by 30 per cent from before the pandemic, according to Gartner, Inc. Employees are both less likely to observe misconduct and less likely to report it when observed. “The increase in remote and hybrid working practices has…

Read More

Growing tension between personalized experiences and personal privacy

B2B customers expect companies to be well informed about personal interactions. Seventy-one percent of B2C customers and 86 per cent of B2B customers expect companies to be well-informed about their personal information during a service interaction, according to a survey by Gartner, Inc. A Gartner survey of more than 5,800…

Read More

Protecting patient data with Rubrik

Iconic Australian health service ensures 24/7 operations and rapid ransomware recovery. Rubrik, the Zero Trust Data Security Company, today announced it has helped the Royal Flying Doctors Service Queensland (RFDSQ) protect business-critical data and minimise the risk of ransomware attacks against the organisation. Now, Rubrik gives RFDSQ cyber resiliency and ensures business continuity so that the health service can continue saving lives across the state. Covering more than 1.7 million…

Read More

Coca-Cola Europacific partners Indonesia taps 8×8 CPaaS

8×8 SMS API to ensure mobile app security. “Our customers, including general trade outlets, are the most important and vital part of our business, and we are committed to create the opportunity to provide a fast and a superior service for them, including investing in digital technology. Klik Toko is…

Read More

Cyber actors exploit network providers and devices

This joint Cybersecurity Advisory was coauthored by the NSA. Summary This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities to establish a broad network of compromised infrastructure. These actors use the network to exploit a wide…

Read More

Three ways security leaders can prepare

Analysts explore the future of cybersecurity. As cybersecurity strategy, leadership and technologies continue to evolve, Gartner, Inc. highlighted three steps security leaders can take now to prepare for the emerging threat landscape over the next 10 years. “The rise of artificial intelligence (AI) is a double-edged sword for CISOs,” said Katell Thielemann, VP…

Read More

Remote code execution vulnerability present

A critical unauthenticated remote code execution vulnerability has been identified. Background / What has happened? Atlassian published a security advisory regarding a critical unauthenticated remote code execution (RCE) vulnerability (CVE-2022-26134) in all supported versions of Atlassian Confluence Server and Data Center. Exploitation of this RCE vulnerability could allow a malicious actor to…

Read More

Global industrial cybersecurity spend to grow

ABI Research’s new whitepaper presents critical and actionable cybersecurity trends and forecasts. Global cybersecurity spending in industrial critical infrastructure sectors (e.g., energy, transport, and water & waste management) is expected to hit $US23 billion by the end of 2022 and grow at a CAGR of 10 per cent to reach $US36.67 billion in 2027. This…

Read More

Exploitation of Microsoft Office vulnerability: Follina

Affected Australian organisations should take appropriate action. Background / What has happened? Microsoft has disclosed a remote code execution (RCE) vulnerability in the Microsoft Support Diagnostic Tool (MSDT). This vulnerability, dubbed “Follina”, can be exploited by an attacker sending a URL to a vulnerable machine. Successful exploitation allows an attacker…

Read More