atlas news
    
TechRepublic : security
23  janvier     19h16
Phishing Emails Targeting Australian Firms Rise by 30% in 2024
Fiona Jackson    For the APAC region as a whole, credential phishing attacks rose by . between and .
    14h44
GhostGPT: Uncensored Chatbot Used by Cyber Criminals for Malware Creation, Scams
Fiona Jackson    Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email.
22  janvier     13h00
How to Create a Secure Username
Luis Millares    Discover how to create a unique and secure username for your online accounts, and find out why it’s just as important as having a strong password.
21  janvier     21h35
Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security
Megan Crouse    The phishing as a service kit from Sneaky Log creates fake authentication pages to farm account information, including two factor security codes.
    18h00
Price Drop: This Complete Ethical Hacking Bundle is Now 35
TechRepublic Academy    Get a comprehensive, potentially lucrative ethical hacking education with courses on today’s top tools and tech. This bundle is just . for a limited time.
    13h00
5 Best Endpoint Detection & Response Solutions for 2025
Luis Millares    Endpoint detection and response EDR software is the best way to detect, investigate, and respond to advanced attacks. Endpoint detection and response software is a security solution that protects against malware and other threats.
20  janvier     13h00
Private Internet Access VPN Review: How Good Is PIA VPN?
Luis Millares    When it comes to privacy and security, PIA VPN is among the best. Discover its features, performance, pricing, and more with this in depth review.
15  janvier     16h53
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025
Ben Abbott    AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in .
    16h19
UK Considers Banning Ransomware Payments
Fiona Jackson    The proposed mandate intends to discourage criminals from targeting critical national infrastructure and public services, as there will be no financial motivation.
    16h03
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks
Megan Crouse    Microsoft’s monthly patches cover Hyper V NT Kernel Integration VSPs, Git in Visual Studio, and more.
    14h00
Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation
Guest Contributor    The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care.
    13h00
CyberGhost VPN Review (2025): Features, Pricing, and Security
Luis Millares    In this comprehensive review of CyberGhost VPN, we cover its features, pricing, security, and overall performance. Find out if this is the right VPN for you.
14  janvier     22h13
Australian Government Agencies Failing to Keep Up With Cyber Security Change
Ben Abbott    Cyber security maturity declines among Australian government agencies in , as legacy IT systems hinder progress under the Essential Eight framework.
    13h00
Windscribe VPN Review (2025): Features, Pricing, and Security
Luis Millares    We evaluate the features, performance, security, and pricing of Windscribe VPN to help you determine if it’s a reliable VPN service for your needs.
13  janvier     21h32
US Chip Export Rule Proposes Limits to Thwart Chinese GPUs
Megan Crouse    The Biden administration states the rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S.
    13h00
Bitwarden vs 1Password: Battle of the Best - Who Wins?
Luis Millares    Bitwarden and Password are two of the top password managers. Find out which password manager is the best for you using this comprehensive comparison.
10  janvier     16h16
Australian IT Sector Maintains Strong Employment Outlook for 2025
Ben Abbott    IT hiring intentions remain strong, though competition for jobs could be fierce.
09  janvier     19h53
What’s Next for Open Source Software Security in 2025?
Megan Crouse    Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open source software in .
    13h00
IPVanish VPN Review: Is it Really as Secure as Claimed?
Luis Millares    Read our comprehensive review of IPVanish VPN. Discover its features, pricing, and more to determine if it meets your online security and privacy needs.
08  janvier     20h09
US to Launch Cyber Trust Mark to Label Secure Smart Devices
Megan Crouse    The Cyber Trust Mark is designed to help consumers make more informed decisions about the cybersecurity of devices they may purchase.