My Facebook is hacked – What do I do?

My Facebook is hacked – What do I do?

I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one. A basic question that you may have is:   Why would someone be interested in my Facebook account? =/ There could be various reasons why someone would...
LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

Sydney, 3 July 2023 – LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions. As a security-first...
Dog Scams

Dog Scams

It is intriguing how people find so many ways to pull innocent people into emotional traps. These scammers strike at a time when people are most vulnerable and use techniques that seem completely harmless. One such scam that gained (un)popularity during the Covid-19...
Recap: Risk to Resilience – ANZ

Recap: Risk to Resilience – ANZ

Trend Micro is currently running one of the largest cybersecurity roadshows ever, the ‘Risk to Resilience World Tour’ covering more than 120 locations around the globe. The event aims to help organisations improve their cybersecurity posture and achieve long-term...
Virtual Patching

Virtual Patching

Scenario 1:MyBank Pty Ltd has 300+ critical legacy enterprise applications. Almost all of them were built by the then IT-savvy non-developers. They were built with limited or no design considerations. Security was not even a design-criteria back then. These...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to...
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually...
Report Reveals the Need for the Convergence of Observability and Security as Rising Complexity of Cloud-Native Development Exposes Australian Organisations to Heightened Security Risks

Report Reveals the Need for the Convergence of Observability and Security as Rising Complexity of Cloud-Native Development Exposes Australian Organisations to Heightened Security Risks

78% of CISOs say they will see an increase in vulnerability exploits if they can’t make DevSecOps work more effectively Sydney, April 27, 2023 – Dynatrace (NYSE: DT), the leader in unified observability and security, has announced the findings of an independent global...
Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the...