Some of the Biggest Movies, TV Shows You Love Rely on Local Data Centre Infrastructure

Image: The Rebel Fleet The Kingdom of the Planet of the Apes trailer was released by Disney’s 20th Century Studios in November 2023. The latest instalment in the hit Planet…

Continue ReadingSome of the Biggest Movies, TV Shows You Love Rely on Local Data Centre Infrastructure

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub…

Continue ReadingEleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

Australia’s Home Affairs Minister Clare O’Neil recently revealed details of Australia’s Cyber Security Strategy 2023–2030. Designed to protect Australia in a fast-moving threat environment, the strategy would rely on building…

Continue ReadingCould Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

White House Executive Order on AI Provides Guidelines for AI Privacy and Safety

The Biden administration directed government organizations, including NIST, to encourage responsible and innovative use of AI. Image: Maksym Yemelyanov/Adobe Stock Today, U.S. President Joe Biden released an executive order on…

Continue ReadingWhite House Executive Order on AI Provides Guidelines for AI Privacy and Safety

Gartner: 60% of Software Buyers Express Regret After Purchasing Products

The global landscape of software purchasing is currently marked by an alarming rate of post-purchase regret and churn, according to this Gartner Digital Market’s 2024 tech trends report. Findings revealed…

Continue ReadingGartner: 60% of Software Buyers Express Regret After Purchasing Products

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

A new report from Microsoft Incident Response and Microsoft Threat Intelligence teams exposed the activities and constant evolution of a financially oriented threat actor named Octo Tempest, who deploys advanced…

Continue ReadingMicrosoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually. Image: ink drop/Adobe Stock Security researchers from three…

Continue ReadingApple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History