To tackle the growing menace of ransomware and other types of attacks, organisations should take recourse to conduct a cybersecurity audit and identify the gaps.
To tackle the growing menace of ransomware and other types of attacks, organisations should take recourse to conduct a cybersecurity audit and identify the gaps.
Given the stiff laws enacted by the Australian government to prevent incidents of data breaches, enterprises must strengthen their cybersecurity infrastructure.
Australian businesses can conduct web application cybersecurity assessments to detect and remediate bugs or vulnerabilities in their web apps to deliver better UX.
Businesses in Australia need to address the menace of cybersecurity by implementing measures such as red team assessment, cybersecurity management, etc.
The advent of technology, especially of the digital kind, has made us more connected than ever and our lives fast and convenient. However, with digitization being embraced across organizations, domains, and geographies, cybercrime has reared its ugly head. It is...
Background The Microsoft Threat Intelligence Center (MSTIC) has released information on the uncovering of a widespread malicious email campaign undertaken by the activity group that Microsoft tracks as NOBELIUM. Nobelium, which operates from Russia, is the name given to the threat actor behind...
In the previous installation, we delved into the history of the primary victim, Kaseya and the bad actors, REvil. From previous exploits to the final and most devastating one, REvil is and will continue to be a force to reckon...
In 2019, Cybernetic Global Intelligence had warned about REvil. Refer to our previous blog on GandCrab ransomware: Is it back under a new REvil guise? The fourth of July celebrations in America this year were slightly different for around 1500 organizations...
From 22 February 2018, it became a requirement for certain data breaches, known as “eligible data breaches”, to be notified to the Australian Privacy Commissioner and affected individuals. Previously, it was not mandatory to supply notification of data breaches. A...
Cloud computing has been adopted by almost every organization due to its various benefits and work flexibility. However, with this adoption of the cloud, certain cybersecurity issues have been observed in cloud computing. Approximately 94% of organizations are moderate to...