IT Brief Australia logo
Technology news for Australia's largest enterprises

Hackers news stories

Story image
Cybersecurity
Companies rushing to secure print infrastructure
As the pandemic prioritised communication channels and the shift to remote work, IT departments fell behind in updating the security of print and IT infrastructure.
Story image
Cyber warfare
Native technologies used in Russia-Ukraine cyber attacks
The conflict between Russia and Ukraine is raging not only in the physical realm, but also on the cyber front.
Story image
Phishing
Cyberattacks on governments beyond Ukraine surge by 21% - Check Point
Check Point Research provides updates on cyberattack trends observed during the Russia-Ukraine conflict. 
Story image
Axonius
How incident responders fight infotech fires
When systems fail, or hackers strike, incident responders represent an organisation’s first line of defence.
Story image
Cybersecurity
How to make a business ‘invisible’ to hackers
Critical to every organisation is how to stop a cyber-security breach AND the damage it causes and do so within available budgets.
Story image
Cybercrime
Why cyber crime will continue to flourish in 2022
Cybercrime flourished in 2021, and there are no signs that it will slow down in 2022. There are several factors behind this high-confidence prediction.
Story image
Malware
Forcepoint reveals the top 5 cybersecurity trends to watch out for in 2022
From prevention to jacking, we look at the top enterprise cyber secuerity trends to investigate.
Story image
Cybersecurity
Webinar: Sophos explains how to break a hacker's heart and ruin their day
Hackers' actions can bring down businesses, infrastructure, and even entire countries. But what if they could no longer do any of these things?
Story image
Cloud Security
HP finds remote work is creating a growing cybersecurity risk
HP has released a security report finding remote work is creating a growing cybersecurity risk.
Story image
Cybersecurity
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.
Story image
DDoS
Revealed: Imperva publishes research on decade old botnet, responsible for millions of attacks
Imperva Research Labs has revealed findings of a six-month intensive investigation into a botnet that has been exploiting CMS vulnerabilities.
Story image
Cybersecurity
HackerOne hits $100M milestone with bug bounties
“We have arrived at the point in history where you are ignorant and negligent if you do not have a way to receive useful input from ethical hackers."
Story image
Cybersecurity
PUBG Mobile cracks down on dirty cheaters
Players will be able to use the Death Replay to see how they were killed from their opponent’s perspective.
Story image
Hackers
Australian women-focusd hackathon #SheHacks expands across Victoria
"We want to make Australia the best place in the world for women to build and scale a startup. #SheHacks is the perfect starting point for any woman wanting to create something great."
Story image
Cybersecurity
Want $10,000? Unisys tempts hackers at San Francisco event
Participants will try to compromise a target system protected by Stealth, Unisys’ encrypted, identity-based microsegmentation solution.
Story image
Malware
Huge growth in malware connected to popular musicians - Kaspersky
Cybercriminals are actively abusing the names of artists and songs nominated for a Grammy 2020 award, in order to spread malware.
Story image
Film
Get ready to take the red pill: The Matrix is coming back
“As you can see, we've had our eye on you for some time now, Mr. Anderson..."
Story image
Gaming
Cyber criminals targeting the gaming industry at an alarming rate
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Story image
Cybercrime
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Story image
Cybersecurity
Use a password manager? New study reveals it may be worse than useless
The study finds using a number of the top password managers is no better than putting your passwords in a text file and saving it to your desktop.
Story image
Application Security
When hackers get the munchies, they just steal McDonalds
What happens when hackers get the munchies? Apparently in Canada, they decide to put their ‘hamburglar’ gloves on and go after unwitting people who happen to use the McDonalds app.
Story image
Cybersecurity
WatchGuard’s eight (terrifying) 2019 security predictions
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Story image
Hackers
Exclusive: Venafi talks weaponisation of machine identities
As companies integrate more digital tools into their business, many of them remain unaware of the risk code-signing certificates are exposing them to.
Story image
Hackers
French national behind UK data breach caught in Thailand
Europol has revealed details surrounding the arrest of a 25-year-old coder who allegedly helped to extort a British organisation.