Articles

  • 1 week ago | cyberdaily.au | David Hollingworth

    The campaign revolves around two sets of malware, dubbed MOONSHINE and BADBAZAAR. Both are trojans, carefully hidden inside what appears to be perfectly normal applications either downloaded from a traditional app store or file-sharing platforms. The actors behind the campaign have even been observed taking part in forums used by their target groups, actively sharing the suspect apps with their victims.

  • 2 weeks ago | cyberdaily.au | David Hollingworth

    A spokesperson has told Cyber Daily that no university data has been compromised after a hacking forum member claimed to have breached its GitHub repositories. Following the news of a cyber security incident impacting 10,000 students at the University of Western Sydney, sandstone institution the University of Sydney has had to respond to claims that a hacker had compromised some of the university’s source code.

  • 2 weeks ago | cyberdaily.au | David Hollingworth

    Ransomware gang lists Sydney-based Consonic on leak site following alleged theft of 28 gigabytes of ‘essential corporate information’. The Akira ransomware gang claimed this week to have exfiltrated 28 gigabytes of data from Australian engineering services company Consonic. The gang’s darknet leak post was dated April 9, and despite it being removed from the leak site shortly after, threat intelligence company VenariX was able to save a screenshot of the post before its removal.

  • 2 weeks ago | defenceconnect.com.au | David Hollingworth

    The war in Ukraine has rewritten the rules for what near-peer conflict might look like, and those rules are still being written – here are some of the key takeaways after three years of bitter fighting. From the prevalence and impact of drones on combat operations to the importance of coordinated long-range fires, the fighting in Ukraine has acted as a wake-up call for militaries around the world, forcing governments to rethink defence strategies and spending priorities.

  • 2 weeks ago | cyberdaily.au | David Hollingworth

    The gang, as a rule, does not share evidence of its claims, nor any details of its ransom demands or deadline. However, like many ransomware actors, Akira casts itself as something of a penetration tester. “Well, you are here. It means that you're suffering from cyber incident right now,” the gang says on its leak site. “Think of our actions as an unscheduled forced audit of your network for vulnerabilities. Keep in mind that there is a fair price to make it all go away. “Remember.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
1K
Tweets
34K
DMs Open
Yes
No Tweets found.