Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware. French security researcher Maxime Ingrao described last week on Twitter how he had discovered the new malware, named “Autolycos”, and […]… Read More

The post More malware-infested apps found in the Google Play store appeared first on The State of Security.

Among the many challenges businesses contend with in the global marketplace today, the 11th Allianz Risk Barometer 2022 ranks cybersecurity threats as the most important business risk. This proves beyond any doubt that enterprises are experiencing increasing threats and full-on attacks to their information technology systems. To safeguard their network systems and entire security architecture, […]… Read More

The post The State of Security: Malware in 2022 appeared first on The State of Security.

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences. The attackers used AiTM (Attacker-in-The-Middle) reverse-proxy sites to pose as Office 365 login pages which requested MFA codes, and then use them to log into […]… Read More

The post 10,000 organisations targeted by phishing attack that bypasses multi-factor authentication appeared first on The State of Security.

Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies. “Lockdown Mode” is scheduled to arrive later this year with the release of Apple iOS 16 and macOS Ventura. It’s an optional feature for users who believe their computers […]… Read More

The post Lockdown Mode: Apple to protect users from targeted spyware attacks appeared first on The State of Security.

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures. In addition, there is a worldwide shortage of cybersecurity […]… Read More

The post How to Protect Your Remote Workforce from a Cyberattack appeared first on The State of Security.

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are: Treat everything like it’s vulnerable. Assume […]… Read More

The post Reexamining the “5 Laws of Cybersecurity” appeared first on The State of Security.

Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing. Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision-makers in organizations with at least 500 […]… Read More

The post Cyberthreat Defense Report 2022: Key Points You Should Know appeared first on The State of Security.

The most relevant cybersecurity threat to most businesses may be human, not technical. A sudden wave of cybercrime paired with longstanding tech labor challenges has created a cybersecurity skills gap, leaving companies without the expertise they need. Some companies lack dedicated security staff entirely, while others have a small, overworked department trying to manage massive […]… Read More

The post 5 Potential Solutions to the Cybersecurity Talent Shortage appeared first on The State of Security.

The Government of Western Australia has pledged to invest Aus $25.5 million to bolster the state’s Cybersecurity services. And the funding will come from the available Aus$500 million financial help related to Digital Capability Fund meant to bolster the state’s current cyber capabilities of intelligence exchange, prevention, detection and response to cyber threats.

Sources report that the funding will help in recruiting new talent required for the proper functionally of the cyber security operations centre meant to protect Aussie populace from cyber scams, currency stealing and cyber stalking.

Meanwhile, at the opening on Macquarie Telecom’s IC3 Data Center, the Australian Prime Minister Scott Morrison warned that public and private entities should start prioritizing trust over costs and efficiency for data security.

And the alert was issued when the world has taken lessons from the ongoing cyber attacks on Ukraine by Russia that could trigger the world war 3 at anytime, soon!

Taking the newly built Macquarie Telecom’s Data Centre as best example, Morrison wanted companies to develop security skills and build secure critical infrastructure like the IC3 East.

Macquarie Telecom Data Centre is a 10MW server farm and is being officially called as Intellicentre 3 East (IC3 East). It was built to protect federal firms from cyber threats, mainly state sponsored cyber attacks.

Note 1- In February 2022, the Department of Home Affairs introduced 3 new parliamentary bills related to critical aviation and marine cybersecurity, mobile phone access to prisons, and the federal government ransomware action plan.

Note 2– The 2nd tranche of cyber laws are being introduced to create standard in the critical infrastructure framework for Australia’s intelligence agencies.

 

The post Western Australia to invest AUS $25.5 million to bolster state cyber security services appeared first on Cybersecurity Insiders.