Gemma Crawford

A Critical Vulnerability in Chrome’s V8 JavaScript Engine

A Critical Vulnerability in Chrome’s V8 JavaScript Engine A significant security flaw, identified as CVE-2024-5830, has been uncovered in Chrome’s V8 JavaScript engine. Initially reported in May 2024, this vulnerability could allow attackers to execute arbitrary code on a user’s device simply by visiting a malicious website. The vulnerability stems from a type confusion error […]

A Critical Vulnerability in Chrome’s V8 JavaScript Engine Read More »

Generative AI: A New Weapon in the Cybercriminal Arsenal

A Critical Vulnerability in Chrome’s V8 JavaScript Engine A significant security flaw, identified as CVE-2024-5830, has been uncovered in Chrome’s V8 JavaScript engine. Initially reported in May 2024, this vulnerability could allow attackers to execute arbitrary code on a user’s device simply by visiting a malicious website. The vulnerability stems from a type confusion error

Generative AI: A New Weapon in the Cybercriminal Arsenal Read More »

Cyber Security Monthly Roundup – August 2024

Cyber Security Monthly Roundup – August 2024 August 2024 has been a particularly eventful month in cybersecurity, marked by critical infrastructure attacks, significant data breaches, and escalating cyber threats leveraging emerging technologies. Below is a roundup of the most impactful stories that shaped the cybersecurity landscape this month. Cyberattacks Targeting Critical Infrastructure in Australia Australia’s

Cyber Security Monthly Roundup – August 2024 Read More »

Fortifying Financial Security: Addressing the Growing Threats and Costs of Cybercrime

Fortifying Financial Security: Addressing the Growing Threats and Costs of Cybercrime Fortifying financial security against cybercrime is increasingly critical for the financial sector. With nearly 20% of cyber incidents targeting financial institutions, resulting in direct losses of $12 billion, it’s evident that robust cybersecurity measures are essential. As our digital world expands, the threat landscape

Fortifying Financial Security: Addressing the Growing Threats and Costs of Cybercrime Read More »

Navigating Cybersecurity Risks Post-Microsoft-CrowdStrike Outage

Navigating Cyber Security Risks Post-Microsoft-CrowdStrike Outage In the aftermath of the recent worldwide tech outage caused by a faulty software update from cybersecurity firm CrowdStrike, small businesses find themselves at increased risk. Here are key points to consider: Be Sceptical of Unexpected Communications: Small business owners and employers should exercise caution when encountering unexpected emails,

Navigating Cybersecurity Risks Post-Microsoft-CrowdStrike Outage Read More »

Big Tech on Notice: Australia’s New Anti-Scam Law and Its Impact on Businesses

Big Tech on Notice: Australia’s New Anti-Scam Law and Its Impact on SMEs A significant development is shaking up the Australian cybersecurity landscape: the proposed anti-scam law targeting large internet companies. While aimed at Big Tech, the implications of this legislation extend to all businesses in the digital space, especially Small and Medium Enterprises (SMEs).

Big Tech on Notice: Australia’s New Anti-Scam Law and Its Impact on Businesses Read More »

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack The recent cyberattack targeting Quantum Radiology, a prominent Australian medical imaging provider, serves as a stark reminder of the growing cyber threat landscape. While the healthcare sector is often a prime target for malicious actors due to the sensitive nature of patient data, the lessons learned from

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack Read More »

Why Your Business Needs Continuous Vulnerability Management

Why Your Business Needs Continuous Vulnerability Management In today’s threat landscape, attackers are constantly innovating and exploiting new vulnerabilities as soon as they emerge. Traditional, point-in-time vulnerability scans leave a dangerous gap in your defences. That’s where Continuous Vulnerability Management (CVM) comes in. Here’s why CVM is a critical addition to your security posture: Real-time

Why Your Business Needs Continuous Vulnerability Management Read More »

What Is Endpoint Detection and Response (EDR)

What Is Endpoint Detection and Response (EDR) Introducing EDR and answering your most pressing questions, this guide dives into Endpoint Detection and Response, a modern approach to endpoint security. EDR goes beyond traditional antivirus by proactively detecting suspicious behaviour and responding before harm is done. Read more for an in-depth look at EDR and MDR

What Is Endpoint Detection and Response (EDR) Read More »