Hello, Guest!

Category: Cybersecurity

ai tech
Post

UK Cyber Chief Urges Developers to Secure AI Tech

Security should be a core requirement in developing artificial intelligence capabilities, according to Lindy Cameron, CEO of the National Cyber Security Centre in the U.K. Appearing as a keynote speaker at the recent Chatham House Cyber 2023 conference, Cameron called on developers to anticipate security risks and embed mitigating measures when designing AI tools, the...

Post

Russia-Linked Ransomware Group Attacks UK Private Security Firm

Zaun, a British company that provides perimeter fencing products to military and intelligence sites, has been hit by a ransomware attack. In a statement published on its website, Zaun said the LockBit ransomware group launched the attack through a computer running the Windows 7 operating system and software for a manufacturing machine, allowing LockBit to...

infamous chisel malware
Post

Report Warns of New Russian Malware Campaign Against Ukraine

The National Security Agency, the FBI and the Cybersecurity and Infrastructure Security Agency have released a joint report with international partners warning on a new Russian military malware campaign against Ukraine. The report seeks to uncover and mitigate the new malware named Infamous Chisel from Russian cyber elements called Sandworm that targets U.S. government and...

malware insfrastructure
Post

US-Led Multinational Operation Takes Down Qakbot Malware Infrastructure

The FBI and the Department of Justice announced on Tuesday that a multinational operation has dismantled a malware infrastructure called Qakbot that cybercriminals used in ransomware attacks, online financial fraud and other cybercrimes. The FBI Headquarters’ Cyber Division and FBI Los Angeles collaborated with partners in France, Germany, the Netherlands, Romania, Latvia and the United...

cyber policy
Post

Cyber Policy Experts Call for Better Laws on Online Security

The online security bills U.S. lawmakers are trying to legislate are “misguided” and designed to break encryption protecting personal privacy, according to cyber policy experts Tarah Wheeler and Geoffrey Cain. Wheeler, a Council on Foreign Relations senior fellow for global cyber policy, and Cain, a senior fellow in the tech policy think tank Foundation for...

Ransomware keycap of a keyboard
Post

Canadian Cyber Center Identifies Russia, Iran as Cybercrime Safe Havens

Canada’s cybersecurity center has pinpointed Russia and Iran as nations “very likely” acting as safe havens for cybercriminals. In its newly released document, titled “Baseline Cyber Threat Assessment: Cybercrime,” the Canadian Centre for Cyber Security cited third-party reports and decisions of agencies in other countries supporting the assessment that Russia and Iran are sponsoring cybercriminals...

eye hacking networks
Post

Microsoft: A China-Linked Hacking Campaign Is Targeting Taiwan Networks

Microsoft has tracked down a China-linked hacking operation called Flax Typhoon that appears to target Taiwan-based organizations for long-term access to their networks. In a blog post, the tech giant said the activity used vulnerabilities in operating systems and applications to access the networks. Based on Microsoft’s observations, the threat actors linger on breached systems....

cybersecurity training
Post

Fortinet To Provide Free Cyber Awareness Training to Teachers Across Australia

Fortinet Australia said it will provide teachers with free training about cybersecurity through its Security Awareness and Training service program. In a statement, Nicole Quinn, head of government affairs for Asia Pacific at Fortinet, said the program will be localized and customized to suit administrators and teachers of Australian schools. The plan is to deliver...

the white house
Post

EO Empowers Treasury to Regulate US Tech Investments in China

President Joe Biden signed an executive order Wednesday authorizing the Department of the Treasury to regulate U.S. technology investments in China and other countries of concern. The regulatory measure covers three technological sectors sensitive to national security, namely: semiconductors and microelectronics, quantum information technologies, and artificial intelligence. The EO follows extensive and thorough consultations by...

oracle logo
Post

Oracle Delivers Secure Digital Services, Capabilities With New Australian Government Cloud

Oracle has unveiled Oracle Cloud for Australian Government and Defense for the Canberra region, a new platform that offers over 100 services that enable customers to build and run cloud-hosted applications. Through the new region, government cloud users can access services, applications and integrated security capabilities to help them harness data and optimize workload, Oracle...

;