‘Junk gun’ ransomware: Peashooters can still pack a punch
In the 1960s and ’70s, the US firearms market saw an influx of cheaply-made, imported handguns. Legislators targeted the proliferation...
In the 1960s and ’70s, the US firearms market saw an influx of cheaply-made, imported handguns. Legislators targeted the proliferation...
Armis is warning that global elections will be the largest attack vector for nation-state actors looking to cause mass disruption...
Following three years of intensive research, an international team of researchers have compiled the first ever ‘World Cybercrime Index’, which...
In December 2023, Sophos X-Ops received a report of a false positive detection on an executable signed by a valid...
Let’s say that, during the middle of a busy day, you receive what looks like a work-related email with a...
Scott Tyson (L), Sophos Director of Channel Sales – MSP EMEA, and Rob Harrison (R), Sophos SVP of Product Management...
As media partners, MySecurity Media is excited to announce the Australian CIO Summit returns on July 22-23 at The Star Gold Coast, Queensland Australia. The...
NIST has posted an initial public draft of Cybersecurity White Paper (CSWP) 33, Product Development Cybersecurity Handbook: Concepts and Considerations for...
Exploited unpatched vulnerabilities are the leading root cause of successful attacks, as reported in Sophos’ 2024 Ransomware Report. The modern...
To deploy a ransomware attack, adversaries must first gain access to a victim’s corporate environment, devices, and data. Threat actors...
The first Sophos Active Adversary Report of 2024 presents what the Sophos X-Ops Incident Response (IR) team has learned about...
Kyndryl Foundation has announced that the University of Technology Sydney (UTS) is one of 11 organisations from seven countries to...
The University of NSW has released the Australian Government Women in STEM Ambassador’s 2023 Annual Review. The breadth and depth...
An abundance of successful cyberattacks in the final quarter of 2023 resulted from threat actors leveraging known and exploitable vulnerabilities,...
The US Department of Homeland Security (DHS) and European Commission’s Directorate General for Communications, Networks, Content, and Technology (DG CONNECT)...