Monday , January 27 2025

Australia to build six ‘cyber shields’ to defend its shores

Yesterday, Home Affairs Minister Clare O’Neill announced that Australia will construct “six cyber shields” to safeguard the nation. This initiative is a crucial aspect of the comprehensive national cyber security strategy.

During a speech at a cybersecurity summit, the strategy was outlined with six “shields.”

UnitedHealth confirms 190 million impacted by 2024 data breach

UnitedHealth confirmed that the ransomware attack on its Change Healthcare unit last February impacted about 190 million Americans, nearly double...
Read More
UnitedHealth confirms 190 million impacted by 2024 data breach

Registration Open For BCS CTF 2025

So, to test your cyber security skill, here is another chance to do that. Bangladesh computer society (BCS) is going...
Read More
Registration Open For BCS CTF 2025

New Ransomware Tactics Target VMware ESXi Via SSH Tunneling

Sygnia's recent report highlights the changing strategies of ransomware groups targeting VMware ESXi appliances. These attackers exploit vital virtual infrastructure...
Read More
New Ransomware Tactics Target VMware ESXi Via SSH Tunneling

Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting...
Read More
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass

CISA Releases 6 ICS Advisories Detailing Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released 6 advisories for Industrial Control Systems (ICS), highlighting vulnerabilities in various...
Read More
CISA Releases 6 ICS Advisories Detailing Security Issues

Account Credentials for Security Vendors Found on Dark Web: Cyble Report

# "While many leaked security credentials belong to customers, some exposed sensitive accounts suggest that security vendors too have been...
Read More
Account Credentials for Security Vendors Found on Dark Web: Cyble Report

Four Critical Ivanti CSA Vulnerabilities Exploited: CISA , FBI warns

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory...
Read More
Four Critical Ivanti CSA Vulnerabilities Exploited: CISA , FBI warns

GitLab Releases Patch (CVE-2025-0314) for XSS Exploit

GitLab has released update for high severity cross-site scripting (XSS) flaw. Versions 17.8.1, 17.7.3, and 17.6.4 for both Community Edition...
Read More
GitLab Releases Patch  (CVE-2025-0314) for XSS Exploit

CVE-2025-20156
Cisco Fixes Meeting Management Allowing Privilege Escalation

Cisco has released a security advisory concerning a critical privilege escalation vulnerability (CVE-2025-20156) in its Meeting Management software. With a...
Read More
CVE-2025-20156  Cisco Fixes Meeting Management Allowing Privilege Escalation

Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Fortinet customers must apply the latest updates, as almost 50,000 management interfaces remain vulnerable to the latest zero-day exploit. The...
Read More
Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack
  • Education is essential for businesses and citizens to become well-informed about the online threats they encounter, learn how to defend their interests effectively, and be aware of the support available to them following any incidents.
  • Safe technology refers to having clear global standards for digital safety in products. These standards ensure that security is integrated into products from the beginning. The minister’s objective is to ensure that when you purchase a digital product in our country, it has undergone strict safety measures, just like you wouldn’t buy a car from a car dealership that is not safe to use.
  • Exchange threat intelligence between government and business in real-time to block threats before they harm Australians.
  • Enhancing government digital defenses is crucial for the protection of critical infrastructure.
  • We need to establish a robust cyber ecosystem where we have the necessary expertise and skills, where the field of cybersecurity becomes an attractive profession for young individuals nationwide. Our goal should be to create a versatile system that can adapt to new challenges and ensure our sovereignty in information security.
  • We must unite in a global effort to promote a stronger and more resilient region. This can be achieved through heightened engagement and strengthened partnerships, all aimed at enhancing our security. Assisting Australia’s neighbors to improve their security is part of this agenda.

By the year 2030, O’Neill envisions Australia to become a global leader in all aspects of cybersecurity, with all the aforementioned developments being implemented accordingly.

ALSO READ:

18 free Microsoft Azure cybersecurity resources

Check Also

CISA

CISA Adds Second BeyondTrust Flaw to KEV On Active Attacks

U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a second security flaw affecting BeyondTrust’s Privileged …

Leave a Reply

Your email address will not be published. Required fields are marked *