Logicalis Recognised as an Industry Leader in IDC
The IDC MarketScape report assesses the capabilities and strategies of many prominent network consulting firms, and to be recognised and positioned...
Logicalis Recognised as an Industry Leader in IDC
The IDC MarketScape report assesses the capabilities and strategies of many prominent network consulting firms, and to be recognised and positioned...
Tags Cloud, IT consultation, IDC, Logicalis, Industry Leader
Medical Records exposed in Health Sector Cyber Attacks
A Cyberattack on the Melbourne Heart Group, a specialist cardiology unit at Cabrini Hospital in Malvern, made news headlines on Thursday. The...
Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Health Sector, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII
Federal Government Acknowledge Hack on Parliament by ‘Sophisticated State Actor’
The Australian Government’s acknowledgement yesterday that a ‘sophisticated state actor’ was to blame for a breach...
Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII
RDP Clients Vulnerable to Remote Execution Attack
Researchers at CheckPoint discovered a total of no less than 25 vulnerabilities in popular implementations of the Remote Desktop Protocol (RDP)...
Tags Security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Leaked Database, Scam, Scammers, Flaw, Encryption, Health Sector, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts