Tag: Vulnerability Assessment

HomeArchives

Fast Flux: The Invisible Web Threat That’s Hard to Catch

Some threats on the internet are easy to see. Others work in the background, silently helping cybercriminals stay hidden. Fast flux is one of those hidden threats. It helps hackers cover their tracks, keep malicious sites running, and stay one...

Continue Reading  

Cyberattack on Genea: A Wake-Up Call for Healthcare Data Security

In February 2025, Genea, one of Australia's leading fertility services providers, experienced a significant cyberattack that compromised sensitive patient data, highlighting critical vulnerabilities in healthcare cybersecurity.​  Discovery and Immediate Response  On February 14, 2025, Genea detected suspicious activity within its...

Continue Reading  

Critical Cybersecurity Risks in Contec Health CMS8000 Monitor

In today's connected healthcare environment, medical devices are increasingly vulnerable to cyber threats. One such device is the Contec Health CMS8000 Patient Monitor, which has recently been flagged by the Cybersecurity and Infrastructure Security Agency (CISA) for severe vulnerabilities. These...

Continue Reading  

Protective Security Policy Framework 2024: What You Need to Know

The Australian Government's Protective Security Policy Framework (PSPF) Released 2024 was launched on November 1, 2024. The new release is the first in an annual series that aims to improve the security of government operations. The recent version of the PSPF...

Continue Reading  

Importance of a Robust Risk Management Framework for Cybersecurity

In the rapidly evolving landscape of digital transformation, cybersecurity has become a cornerstone for any organisation. Businesses face an ever-expanding array of cyber threats, from ransomware attacks to insider threats and supply chain vulnerabilities. Conducting a vulnerability assessment is a...

Continue Reading  

Mitigating Insider Threats: How Organisations Can Detect, Prevent, and Respond

Insider attacks have become a major problem for enterprises in the current digital ecosystem. Such a risk arises from a worker or from a trusted insider who, having confidential information, deliberately or accidentally exposes that security to danger. Such acts...

Continue Reading  

Recent Surge in Data Breaches in Australia: January to June 2024

The Office of the Australian Information Commissioner’s (OAIC) latest Notifiable Data Breaches Report (January to June 2024) presents a critical reflection on the rising tide of data breaches. This period saw a substantial increase in the number of reported data...

Continue Reading  

Best Practices for Successful Vendor Risk Management

In this modern world of business, companies usually depend on third-party vendors for important services like IT support and managing supply chains. These partnerships can help make things more efficient and promote growth, but they also bring risks that require...

Continue Reading  

FISCAL YEAR 2019 – RISK VULNERABILITY AND ASSESSMENT (RVA)

The Cybersecurity and Information Security Agency (CISA) has released a mapping analysis of 44 of its Risk and Vulnerability Assessments (RVAs) conducted in Fiscal Year 2019 to the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework. CISA has identified...

Continue Reading