Cybersecurity and Open Source Headlines
August 10, 2023Techniques for Getting Malware onto Android Devices; The Critical Shortage of Cybersecurity Talent; Ransomware 2.0 Pivots From Traditional Strategies; AI…Cybersecurity and Open Source Headlines
August 9, 2023Highly Accurate Acoustic Keylogger Attack; Top Vulnerabilities: Why don’t we learn? ; Review of 2022; Vulnerabilities PoV - Log4j Still…Cybersecurity and Open Source Headlines
August 8, 2023Frequently Exploited Vulnerabilities in 2022; North Korean Hackers Versus Russian Missile Makers; Volt Typhoon creeps into Texas; Regulation China FRCybersecurity and Open Source Headlines
August 7, 2023Tax Refund Scams costing Australian Tax Office Over Half a Billion Dollars; Close that IDOR!; FraudGPT; Building Social ResilienceCybersecurity and Open Source Headlines
August 4, 2023Potential WeChat Ban on Australian Government Devices, NATO Tech Funding, Apple Kernel Flaw CVE 2023-38606, New Apple Vulnerability: Device Owner…Cybersecurity and Open Source Headlines
August 3, 2023Don't Let Your Printer Compromise Your Network; Space Pirates Attack Across Russia and Serbia; Worldcoin says it will share its…Cybersecurity and Open Source Headlines
August 2, 2023Australian Government Initiative to Improve Cyber Security Suffers Data Leak; What the fork?; Break the Silos to Achieve Cyberresillience; Connected…Cybersecurity and Open Source Headlines
August 1, 2023Déjà vu-lnerability - What is Old can be a Zero-day Again; Android Messaging Spyware App Steals Signal and WhatsApp Data;…Cybersecurity and Open Source Headlines
July 31, 2023Easy to Exploit Vulnerabilities Affecting 40% of Ubuntu Systems; CRA Moves Into Negotiations With The Council; Hackers unleash ZIP Domains;…Cybersecurity and Open Source Headlines
July 28, 2023Dear Jen, Merrick, and Lina. What's up with Microsoft?; Call of Duty? Watch out for the malware in the lobby;…