News

Threat Intelligence today confirmed its Evolve security automation platform has successfully completed its final round presentation in the inaugural Optus Innovation Challenge program.

Five finalists have been selected from 85 applications for the Optus inaugural innovation challenge, with the telco praising the high volume of quality startups which participated in the program.

If you put your printers on the Internet with default passwords and vulnerable software, you’re going to get hacked

Threat Intelligence launched Evolve, its unified security automation platform.

Evolve is a new cloud-based all-in-one security automation platform for automated penetration testing, automated security infrastructure orchestration and automated incident response.

Jul 31, 2018

Threat Intelligence announced the launch of Evolve, a new cloud-based security automation platform.

Threat Intelligence would like to draw your attention to the Mandatory Notifiable Data Breach reporting legislation that came into effect today, 22 February 2018, with potential fines of up to $420,000 per individual and up to $1,200,000 for the companies that do not comply.

The pressure is on Australian banks to keep up with customer’s growing use of smartphone apps to pay for in-store and online purchases.

The flaw in the WPA2 wireless protocol revealed recently has a critical impact on Android phones running version 6.0 of the mobile operating system and Linux devices, a security researcher says.

Threat Intelligence Expert Provides Insights on the long-term impacts of the KRACK attacks and what organisations should do to protect themselves long-term.

Sept 19, 2017

Fears of hacking are causing an increasing number of SMEs to abandon having a website, opting instead for other forms of internet presence.

Internet security experts are urging people to update their software to protect against a serious vulnerability, which if exploited could spread uncontrollably via the common wireless technology bluetooth.

This is the latest in a long list of security flaws, however this is considered to be one of the most dangerous attack vectors that has been released. In fact, with an estimated 8 billion devices potentially affected, it could be the largest ever security flaw to date.

A hacker who goes by the alias “xerub” has managed to successfully crack Apple’s Secure Enclave firmware decryption key for their iOS devices. The Secure Enclave Processor (SEP) is used by iOS devices to store and manage the encryption keys and authentication process for the device.

Aug 11, 2017

The 20th edition of Black Hat USA (BHUSA) did not disappoint, if your expectations were the largest exhibit floor, the most lasers, and the biggest attendance ever.

We released this brand-new attack technique at Black Hat USA and makes this nightmare a reality by turning your Active Directory Domain Controllers into C&C servers that can then command a powerful internal botnet. This attack technique is a fundamental flaw within the way that nearly every organisation implements their Active Directory solution, which leaves a gaping hole within their security and their ability to contain security breaches.

Australian information security company Threat Intelligence has revealed details of a new attack technique whereby a Microsoft Windows Active Directory domain controller can be transformed into a command-and-control centre for an internal botnet.

July 24, 2017

Your organization has just discovered a serious data breach.

Australian Government organisations can compromise suspects devices to capture everything that they type; however, what they don’t have, in general, is a reliable way of gaining access to encrypted data when they are unable to compromise the target device. This means that critical information to a Government investigation may exist within the encrypted data, but they simply can’t get access to it to prosecute the perpetrator.

July 14, 2017

For millenia humans have used secret codes to protect messages.

Actress Mary Elizabeth Winstead thought she was sharing a private moment with her husband, film director Riley Stearns, when she posed for a number of intimate images in her home several years ago.

Publisher’s Panel in partnership with Darktrace – Using AI for next-generation Cyber Security | IDG Security Day
Moderated by – Anthony Caruana, CSO
Mark Beaumont, Country Manager Australia,
Darktrace Jonathan Chang, Managing Director, Silverpond Stephe

The shortest day of the year in the southern hemisphere marked IDG’s first ever Security Day.

Australia’s top Cyber Security Adviser says it’s fanciful to suggest governments should create conventions to control cyber warfare.

Jan 23, 2017

A federal government department has been blasted over its “appalling response” to a security researcher’s report which found it has been exposing millions of Australians’ personal information by leaving serious security flaws unchecked in a critical gover.

Donald Trump has appointed Rudy Giuliani as his cybersecurity advisor, prompting security experts to cast a critical eye over his consulting firm’s website — and they’re not impressed.

US president-elect Donald Trump’s freshly minted cyber tsar Rudy Giuliani runs a website so insecure that its content management system is five years out of date, unpatched and is utterly hackable.

The cat’s out of the bag for about 60 Australians who thought they could anonymously rent a hacker from a website to do their dirty work.