How North Korean hackers are using fake job offers to steal cryptocurrency
At least 230 victims of ‘Contagious Interview’ threat identified.
Academic researchers created AI-powered “PromptLock” ransomware
Shows why AI-enabled threats should be taken seriously, engineers say.
Agentic cyber security AI abused for Citrix Netscaler attacks
Check Point listens in on “dark web chatter”.
Researchers detail novel cryptomining attack
Targets retail and ecommerce.
Melbourne dev finds gift card PINs can be brute-forced
Cards sold at supermarkets open to redemption robbery.
Jaguar Land Rover hit by cyber incident
Disrupts production, sales.
Department of Health to centralise SecOps model
Issues tender for broad set of cyber capabilities.
DPV Health revamps vulnerability management with automated attack simulation
Podcast: With former CIO Noel Toal.
Zero-click Apple and WhatsApp bug combo used to drop gov spyware
Meta comms app vulnerability could affect Android users as well.
Google tightens Android developer verification
After malware spike for sideloaded apps.