The German government has reached an agreement with local mobile network operators to impose a comprehensive ban on Chinese 5G technology on Huawei and ZTE.
Continue ReadingThreat Research
Army Private Spying for Russia
An Australian Defence Force (ADF) army private, alongside her husband, has been accused of spying on behalf of Russian intelligence.
Continue ReadingAfrican Cyber Crime Gangs
In a significant effort to tackle cyber crime that has plagued nations for years, Interpol has concluded its latest operation, dubbed Operation Jackal III.
Continue ReadingRussia’s Hybrid War on NATO Nations
Russia’s hybrid war against NATO member nations has taken a sinister turn. GPS jamming and cyber-attacks, have become the new frontline.
Continue ReadingMystery of Vanishing Undersea Cable
Undersea cables, stretching across the globe, form the backbone of our interconnected world, facilitating the exchange of data, voice, and video communications.
Continue ReadingEvolving US Strategy in Cyberspace
The internet has become a cyber battleground. The world has witnessed a dramatic shift in the nature of cyber warfare. Cyberattacks are increasing.
Continue ReadingMyanmar’s Cyber Slavery
The internet, a platform designed to connect and empower, has become a breeding ground for a sinister type of exploitation cyber slavery.
Continue ReadingKia and Hyundai Car Thefts
Kia and Hyundai car thefts. A recent wave of incidents has raised alarm bells and prompted urgent warnings from authorities and cyber security experts.
Continue ReadingChina’s Cyber Warfare
The Australian Signals Directorate (ASD) has brought to light that China’s cyber warfare capabilities pose a direct and significant threat to Australia.
Continue ReadingFlorida Investigates Cyberattack
The Florida Department of Health (DOH) is currently investigating a potential cyberattack that may have compromised birth, death, and marriage certificates.
Continue ReadingChinese Cyber Espionage
Australia has taken a decisive stand against persistent cyber espionage threats, specifically those originating from Chinese state-backed actors.
Continue ReadingCyber Threat Intelligence
Cyber Threat Intelligence offers a powerful advantage for organizations striving to protect their assets and ensure their digital safety.
Continue ReadingJobs in InfoSec and Cybersecurity
Latest jobs in Ethical Hacking, Pen Testing, Security, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security.
Continue Reading