Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Australian Cyber Security Strategy for Hardening

Australia aims to be the world leader in cyber security by 2030 using the Australian Cyber Security Strategy that was released on 22 November 2023. With the cost of cybercrime on Australian businesses growing by up to 14% per annum, the Cyber Security Strategy seeks to improve cyber security, manage cyber risks and better support citizens and Australian businesses to manage their cyber environment by using six cyber shields and actions to be taken.

IP Address Alert Investigations: Correlating and Mapping with MITRE ATT&CK

An Internet Protocol (IP) address is the digital equivalent of your home address. Your home has a unique identification number that gives information about your physical geographic location, like road, city, state, and country. An IP address provides similar information about the people and devices connected to a network.

CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the ending was far more devasting. More than 100 organizations were exposed, and many are now grappling with the impacts of data theft and extortion in what some are calling one of the largest breaches in history.

New Ransomware Threat Group Calls Attack Victims to Ensure Payments

Analysis of new ransomware group Volcano Demon provides a detailed look into how and why calling victims ups the chances of ransomware payment. Security researchers at Halcyon have uncovered a new ransomware threat group that initially follows traditional methods – harvesting admin credentials, data exfiltrated to a C2 server, logs cleared and data was encrypted using LukaLocker. However, Volcano Demon attacks take a different direction in the extortion phase.

Savvy Security: Unpacking key SASE vendor selection criteria

Many companies are stepping up their security measures to protect against cyber risks associated with the increasing use of cloud services and remote work. As a result, the global deployment of Secure Access Service Edge (SASE) is on the rise. According to the 2024 Gartner CIO and Technology Executive Survey, 39% of respondents have already deployed SASE or plan to do so within the next 24 months.

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Do you have secrets sprawled across your tech stack? The recent Disney breach is as good a reminder as any to check, because it’s likely that you do. But first, let’s take a closer look at the Disney breach to understand what may have gone wrong, and how you can prevent a similar breach from happening to your business.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.

Continuous Threat Exposure Management (CTEM): A new era in proactive cyber defense

Do we need a new cybersecurity framework? According to Gartner, the answer is yes. Since 2022, they have championed CTEM, a five-stage approach designed to shrink attack surfaces and minimize cyber threat exposure through continuous risk assessment and mitigation. At its core, CTEM advocates for regularly testing your defenses to find vulnerabilities in your system and fortify your organization’s security with risk mitigation strategies.

The Challenges of Full Network Visibility and How a Network Digital Twin Can Help

In today’s complex IT environments, maintaining full network visibility is a daunting task. Network segmentation, while essential for security, often complicates the process of obtaining a comprehensive view of the entire network infrastructure. Federal IT departments charged with the responsibility of keeping networks mission-ready, face significant hurdles in visualizing connectivity, ensuring security zone segmentation, and performing complete path searches across segmented domains.

Navigating Digital Nightmares: A Survivor's Battle Against Online Harassment

Technology can serve as a double-edged sword for women grappling with domestic abuse: while it has the potential to save lives, it also has the capacity to lay bare one's most intimate vulnerabilities. One such harrowing story comes from a survivor (which we will call Bridget to protect her anonymity), who faced a nightmare of cyberstalking, intimate image abuse (colloquially known as revenge porn), and relentless online harassment that lasted for years.