Microsoft Says Ransomware Groups Are Exploiting the Newly-Patched VMware ESXi Flaw

The CVE-2024-37085 vulnerability is present in ESXi hypervisors and can be used to deploy data-extortion malware. Read more »

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Rubrik research finds data breaches were 50% more common in Australia than the global average in 2023. Read more »

Google Workspace Authentication Vulnerability Allowed Thousands of Emails to be Compromised

Hackers managed to compromise “a few thousand” Google Workspace accounts by circumventing the verification process. Read more »

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware attacks are attracting record payouts in Australia. Learn whether paying the ransom is viable, about legal implications and about alternative strategies. Read more »

IPVanish vs NordVPN (2024): Which VPN Is Better?

NordVPN’s useful security features, fast speeds and larger server network gives it a significant advantage over IPVanish’s decent VPN experience. Read more »

ManageEngine: Australian SMEs Aim to Reduce IT Costs Amid Growing Technology Complexity

“Digital intensity” caused by multiple cloud environments, application growth and AI is putting pressure on IT leaders in medium-sized businesses to manage costs while modernising their infrastructure. Read more »

The Top 4 CrowdStrike Alternatives & Competitors in 2024

SentinelOne Singularity and Microsoft Defender for Endpoint are among the top CrowdStrike alternatives to consider following the recent IT outage in July. Read more »

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Separately, iPhone users will need to wait until October for Apple Intelligence LLM services. Read more »

The Top 5 1Password Alternatives for 2024

NordPass, Bitwarden and Dashlane are among a handful of secure and feature-packed password managers for those looking for quality 1Password alternatives. Read more »

How to Build an Effective Security Operations Center

Taking a coordinated security approach is one way to leave no security loopholes. By this, we are referring to a cybersecurity architecture that comprises a team and security components... Read more »
Subscribe to our Newsletter