Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email. Read more »
Discover how to create a unique and secure username for your online accounts, and find out why it’s just as important as having a strong password. Read more »
The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes. Read more »
Endpoint detection and response (EDR) software is the best way to detect, investigate, and respond to advanced attacks. Endpoint detection and response software is a security solution that protects... Read more »
AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in 2025. Read more »
The proposed mandate intends to discourage criminals from targeting critical national infrastructure and public services, as there will be no financial motivation. Read more »
Microsoft’s monthly patches cover Hyper-V NT Kernel Integration VSPs, Git in Visual Studio, and more. Read more »
The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care. Read more »
Cyber security maturity declines among Australian government agencies in 2024, as legacy IT systems hinder progress under the Essential Eight framework. Read more »
The Biden administration states the rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S. Read more »