vulnerabilities

The Future of Cybersecurity in Asia Pacific and Japan – 2nd edition

In 2019 Sophos and TRA collaborated to launch the first edition report of the Future of Cybersecurity in Asia Pacific and Japan. That report revealed that organisations in APJ faced a series of cybersecurity obstacles in the areas of education, company culture, skills, budgeting, and operational management. At the time, the key themes centred on

The Future of Cybersecurity in Asia Pacific and Japan – 2nd edition Read More »

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2020

EXECUTIVE SUMMARY Few of us will fondly remember 2020, a transformative year that forced businesses worldwide to rethink and reprioritize remote workforces, their impact on productivity and business continuity, and the expanded attack surfaces consequential to those changes. Opportunistic attackers went especially low throughout 2020, elevating extortion and ransomware attacks within their arsenals and targeting

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2020 Read More »

AMNESIA:33

How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Executive summary Forescout Research Labs has launched Project Memoria, an initiative that aims at providing the community with the largest study on the security of TCP/IP stacks. Project Memoria’s goal is to develop the understanding of common bugs behind the vulnerabilities in TCP/IP

AMNESIA:33 Read More »

Active Directory Security – A modern approach to avoid exploitation

Active Directory Security – A modern approach to avoid exploitation 10:00am AWST | 1:00pm AEDT See live demo attacks! How is Active Director (AD) being used today and why is it important: The AD Threat Landscape The AD and ransomware relationship Common vulnerabilities in AD being exploited Best practices on how to avoid a compromise

Active Directory Security – A modern approach to avoid exploitation Read More »

A Security Audit of Australian Government Websites

Introduction – A Security Audit of Australian Government Websites Data confidentiality and content integrity in end-to-end communications are critical features of today’s online Web services. Being the cryptographic foundation of the Web, the Hyper Text Transfer Protocol Secure (HTTPS) leverage Transport Layer Security (TLS) protocol to ensures that webpages are secure against external entities eavesdropping

A Security Audit of Australian Government Websites Read More »

Nokia Threat Intelligence Report

Introduction – Nokia Threat Intelligence Report This report provides a view of malware activity in mobile and fixed networks around the world. The data in this report has been aggregated from service provider networks where Nokia’s NetGuard Endpoint Security solution is deployed. This network-based malware detection solution enables Nokia customers to monitor their fixed and

Nokia Threat Intelligence Report Read More »