AI brings fresh power to cybersecurity, hunting threats at speed. It also arms attackers with smarter tools. On one side, attackers sharpen AI to breach systems. On the other, defenders build AI to fight back. What started as tools are...
AI brings fresh power to cybersecurity, hunting threats at speed. It also arms attackers with smarter tools. On one side, attackers sharpen AI to breach systems. On the other, defenders build AI to fight back. What started as tools are...
Australia’s telecom sector has once again been shaken by a major data breach. iiNet, a well-known internet provider, confirmed that the personal data of more than 280,000 customers was exposed after attackers infiltrated its order management system. The attackers gained...
Quantum computing isn’t science fiction anymore. It’s real, it’s moving fast, and it’s going to change how we handle data, security, and systems. With huge computing power, quantum machines will be able to crack encryption that protects almost everything we...
Background The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern beyond the cyber security community. This is because Log4j - rather than being a single piece of software - is a software component that’s used by millions of computers worldwide running online services....
Background Apache Log4j2 is a ubiquitous library used by millions for Java applications; the library is part of the Apache Software Foundation’s Apache Logging Services project. The vulnerability CVE-2021-44228, disclosed on December 9, 2021, allows for remote code execution against...
Background BlackMatter is a new ransomware threat discovered at the end of July 2021. BlackMatter is ransomware-as-a-service (Raas) tool that allows the ransomware's developers to profit from cybercriminal affiliates (i.e., BlackMatter actors) who deploy it against victims. This malware started...
Background The Microsoft Threat Intelligence Center (MSTIC) has released information on the uncovering of a widespread malicious email campaign undertaken by the activity group that Microsoft tracks as NOBELIUM. Nobelium, which operates from Russia, is the name given to the threat actor behind...