
HCKSYD 2024
Just wrapped up an incredible experience at Hack Sydney, a two-day conference held at the stunning Australian National Maritime Museum. The venue was as impressive as the lineup, with engaging talks spanning a wide range of cybersecurity topics—from influencing change...New FakeCall Malware Targets Android Users for Financial Fraud
Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware A new, more sophisticated version of the FakeCall malware has emerged, posing a significant threat to Android users. This malicious app, designed to steal sensitive information and funds,...Western Sydney University Suffers Major Data Breach
https://www.westernsydney.edu.au/about_uws/leadership/governance/privacy_at_western_sydney_university/privacy_breaches_and_complaintshttps://www.itnews.com.au/news/western-sydney-unis-it-systems-compromised-again-612757 Western Sydney University has disclosed a...AI-Powered Scams: A Growing Threat
https://arxiv.org/pdf/2410.15650https://www.bleepingcomputer.com/news/security/chatgpt-4o-can-be-used-for-autonomous-voice-based-scams/ Researchers have unveiled a concerning development in the realm of artificial intelligence: the potential for AI-powered tools to...
Open-Source Vulnerability Management Policy: A Balanced Approach
In today’s rapidly evolving cybersecurity landscape, managing vulnerabilities in open-source components has become increasingly complex. While traditional approaches relying solely on CVSS scores have their merits, they may not be sufficient to address the...Cloud Security Concerns Surge in APAC as Data Breaches Remain High
https://cpl.thalesgroup.com/apac-cloud-security-research A just released study by Thales reveals that cloud security remains a top concern for organizations in the Asia-Pacific (APAC) region, with data breaches continuing to pose significant threats. Key Findings:...Large-Scale Operation Steals Cloud Credentials from Exposed Git Repositories
https://sysdig.com/blog/emeraldwhale A large-scale cyber operation named “EmeraldWhale” has compromised thousands of private repositories by exploiting exposed Git configuration files. Hackers used automated tools to scan a massive range of IP addresses...