News

2025-07-10

GitHub Exploited In Sophisticated Malware Campaign

Malware Disguised As A VPN App: Increasing reliance on open-source repositories calls for much higher-levels of vigilance for deceptive tactics.

2025-07-10

ServiceNow Vulnerability Exposes Sensitive Data To Low-Privilege Users

Count(er) Strike: ServiceNow handles vast amounts of sensitive information across IT operations, HR & Portfolio Management for thousands of companies.

2025-07-10

Turning Compliance Into Competitive Advantage 

Governance, Risk & Compliance: Organisations are shifting GRC's role from a regulatory obligation to a strategic business enabler. By Matt Hillary

2025-07-09

Ground-Breaking Effects Of Technological Developments In Electronics [extract]

Redefining Our Relationship With Machines: From AI and 5G to quantum & neuromorphic computing, these innovations are proving transformative.

2025-07-09

Ground-Breaking Effects Of Technological Developments In Electronics

Redefining Our Relationship With Machines: From AI and 5G to quantum & neuromorphic computing, these innovations are proving transformative.

2025-07-09

Spending On AI Predicted To Surge In 2025

A Leap in Investment: Businesses are optimistic about AI’s transformative potential, with 82% saying GenAI will positively affect them.

2025-07-09

Rockerbox Data Breach Exposes Sensitive Information Of Millions

Exposed Cloud Bucket: A lack of encryption or authentication measures meant that anyone with basic technical knowledge could access sensitive data.

2025-07-09

Ingram Micro Grapples WIth SafePay Ransomware Attack

The attack has sent ripples through the global IT supply chain, highlighting vulnerabilities in even the most trusted technology organisations.

2025-07-08

Qantas Contacted By Perpetrator Of Massive Customer Data Breach

While the breach has been attributed to the prolific hacking collective known as Scattered Spider, Qantas has not confirmed the nature of the contact.

2025-07-07

BMW Financial Services Suffers Supply Chain Breach 

Customer Data Stolen: BMW Financial Services USA has been caught out in a third-party data breach involving a financial services supplier.

2025-07-08

Gamers Can Help Bridge The Skills Gap

An Unlikely Source Of Talent? The skills enabling successful video gamers align with those required by cybersecurity professionals. By Shlomie Liberow

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.