
David Hollingworth
Senior Journalist at Momentum Media
Senior Journalist at Cyber Daily
Senior Journalist at Cyber Security Connect
Roleplayer, nerd, writer, rake, queer, keeper of #TolkienFriday. Journalist (again!), Sydney. Some days Bond; some days Broughton. Pronouns: fluid.
Articles
-
1 week ago |
cyberdaily.au | David Hollingworth
However, J’s initial burst of activity took place in February and March of 2025, and the operation appears to have gone quiet since then. J listed its first victim on February 17, and a further eight victims leading up to March 13. On February 22, it listed an Australian victim – ausfec1.com.au. J appears to only list victims by their URLs, and in this case, the URL does not appear to exist.
-
1 week ago |
cyberdaily.au | David Hollingworth
Physical security firm Genetec has announced a successful assessment of its alignment with the ACSC’s Essential Eight cyber security requirements. Australian cyber security firm CyberCX carried out the Essential Eight Maturity Assessment, and – according to Genetec – the positive result demonstrates the company’s commitment to protecting sensitive data and its readiness to provide security solutions to entities within the public and private sectors.
-
1 week ago |
cyberdaily.au | David Hollingworth
We’re making things too easy for the hackers. “Ransomware remains a crisis because we are still giving attackers the upper hand,” Beek said in a follow-up blog post. “To regain control, we need to understand how we’ve made it so easy for them, and what we can do to change that.” Part of the problem is that ransomware users and developers are evolving at the same scale and speed of the network defenders trying to stop them, and raking in tens of millions of dollars while they do so.
-
1 week ago |
cyberdaily.au | David Hollingworth
Tech leader urges the Australian government to work with the technology industry or risk falling behind on productivity and cyber security. The Australian public re-elected the Anthony Albanese Labor government at the polls on Saturday, handing the party a landslide victory over a comprehensively defeated Coalition.
-
1 week ago |
cyberdaily.au | David Hollingworth
Security researchers discover AirPlay flaws that could lead to complete Apple device takeover. Users of third-party Apple products should be aware of a raft of newly revealed vulnerabilities in Apple’s AirPlay Protocol and AirPlay Software Development Kit.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 34K
- DMs Open
- Yes