Some threats on the internet are easy to see. Others work in the background, silently helping cybercriminals stay hidden. Fast flux is one of those hidden threats. It helps hackers cover their tracks, keep malicious sites running, and stay one...
Some threats on the internet are easy to see. Others work in the background, silently helping cybercriminals stay hidden. Fast flux is one of those hidden threats. It helps hackers cover their tracks, keep malicious sites running, and stay one...
In February 2025, Genea, one of Australia's leading fertility services providers, experienced a significant cyberattack that compromised sensitive patient data, highlighting critical vulnerabilities in healthcare cybersecurity. Discovery and Immediate Response On February 14, 2025, Genea detected suspicious activity within its...
In today's connected healthcare environment, medical devices are increasingly vulnerable to cyber threats. One such device is the Contec Health CMS8000 Patient Monitor, which has recently been flagged by the Cybersecurity and Infrastructure Security Agency (CISA) for severe vulnerabilities. These...
The Australian Government's Protective Security Policy Framework (PSPF) Released 2024 was launched on November 1, 2024. The new release is the first in an annual series that aims to improve the security of government operations. The recent version of the PSPF...
In the rapidly evolving landscape of digital transformation, cybersecurity has become a cornerstone for any organisation. Businesses face an ever-expanding array of cyber threats, from ransomware attacks to insider threats and supply chain vulnerabilities. Conducting a vulnerability assessment is a...
Insider attacks have become a major problem for enterprises in the current digital ecosystem. Such a risk arises from a worker or from a trusted insider who, having confidential information, deliberately or accidentally exposes that security to danger. Such acts...
The Office of the Australian Information Commissioner’s (OAIC) latest Notifiable Data Breaches Report (January to June 2024) presents a critical reflection on the rising tide of data breaches. This period saw a substantial increase in the number of reported data...
In this modern world of business, companies usually depend on third-party vendors for important services like IT support and managing supply chains. These partnerships can help make things more efficient and promote growth, but they also bring risks that require...
The Cybersecurity and Information Security Agency (CISA) has released a mapping analysis of 44 of its Risk and Vulnerability Assessments (RVAs) conducted in Fiscal Year 2019 to the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework. CISA has identified...