How do you actually measure if your security awareness programs are working? Because let’s face it – if you can’t measure it, you can’t improve it. But more importantly, if you can’t prove its value, you can’t justify its budget. THE...
Chinese Hackers Breach Cisco Devices in Global Telecom Attacks A new report reveals that the Chinese state-sponsored hacking group Salt Typhoon has compromised Cisco devices worldwide, targeting telecommunications providers and universities across multiple countries,...
https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances Security researchers have discovered a critical vulnerability in Amazon Web Services (AWS) that allows attackers to gain unauthorized code execution on...
https://www.forbes.com/councils/forbestechcouncil/2025/02/10/securing-the-sdlc-for-no-code-environments Traditional software development relies heavily on a structured SDLC (Software Development Lifecycle) with security baked in at every stage. However, the rise of...
https://cybercx.com.au/resource/dfir-threat-report-2025/ https://www.smh.com.au/technology/healthcare-and-finance-the-hardest-hit-by-cyberattacks-20250205-p5l9ns.html The Australian healthcare sector faced the brunt of cyberattacks in the past year, according to a new...
https://www.macrumors.com/2025/02/06/apple-removed-screen-reading-malware-apps Apple has removed 11 iOS apps from the App Store after they were found to contain malicious code designed to steal sensitive information from users’ devices. Security firm Kaspersky...