atlas news
TechRepublic : security
23 janvier
19h16
Phishing Emails Targeting Australian Firms Rise by 30% in 2024
Fiona Jackson
For the APAC region as a whole, credential phishing attacks rose by . between and .
14h44
GhostGPT: Uncensored Chatbot Used by Cyber Criminals for Malware Creation, Scams
Fiona Jackson
Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email.
22 janvier
13h00
How to Create a Secure Username
Luis Millares
Discover how to create a unique and secure username for your online accounts, and find out why it’s just as important as having a strong password.
21 janvier
21h35
Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security
Megan Crouse
The phishing as a service kit from Sneaky Log creates fake authentication pages to farm account information, including two factor security codes.
18h00
Price Drop: This Complete Ethical Hacking Bundle is Now 35
TechRepublic Academy
Get a comprehensive, potentially lucrative ethical hacking education with courses on today’s top tools and tech. This bundle is just . for a limited time.
13h00
5 Best Endpoint Detection & Response Solutions for 2025
Luis Millares
Endpoint detection and response EDR software is the best way to detect, investigate, and respond to advanced attacks. Endpoint detection and response software is a security solution that protects against malware and other threats.
20 janvier
13h00
Private Internet Access VPN Review: How Good Is PIA VPN?
Luis Millares
When it comes to privacy and security, PIA VPN is among the best. Discover its features, performance, pricing, and more with this in depth review.
15 janvier
16h53
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025
Ben Abbott
AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in .
16h19
UK Considers Banning Ransomware Payments
Fiona Jackson
The proposed mandate intends to discourage criminals from targeting critical national infrastructure and public services, as there will be no financial motivation.
16h03
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks
Megan Crouse
Microsoft’s monthly patches cover Hyper V NT Kernel Integration VSPs, Git in Visual Studio, and more.
14h00
Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation
Guest Contributor
The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care.
13h00
CyberGhost VPN Review (2025): Features, Pricing, and Security
Luis Millares
In this comprehensive review of CyberGhost VPN, we cover its features, pricing, security, and overall performance. Find out if this is the right VPN for you.
14 janvier
22h13
Australian Government Agencies Failing to Keep Up With Cyber Security Change
Ben Abbott
Cyber security maturity declines among Australian government agencies in , as legacy IT systems hinder progress under the Essential Eight framework.
13h00
Windscribe VPN Review (2025): Features, Pricing, and Security
Luis Millares
We evaluate the features, performance, security, and pricing of Windscribe VPN to help you determine if it’s a reliable VPN service for your needs.
13 janvier
21h32
US Chip Export Rule Proposes Limits to Thwart Chinese GPUs
Megan Crouse
The Biden administration states the rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S.
13h00
Bitwarden vs 1Password: Battle of the Best - Who Wins?
Luis Millares
Bitwarden and Password are two of the top password managers. Find out which password manager is the best for you using this comprehensive comparison.
10 janvier
16h16
Australian IT Sector Maintains Strong Employment Outlook for 2025
Ben Abbott
IT hiring intentions remain strong, though competition for jobs could be fierce.
09 janvier
19h53
What’s Next for Open Source Software Security in 2025?
Megan Crouse
Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open source software in .
13h00
IPVanish VPN Review: Is it Really as Secure as Claimed?
Luis Millares
Read our comprehensive review of IPVanish VPN. Discover its features, pricing, and more to determine if it meets your online security and privacy needs.
08 janvier
20h09
US to Launch Cyber Trust Mark to Label Secure Smart Devices
Megan Crouse
The Cyber Trust Mark is designed to help consumers make more informed decisions about the cybersecurity of devices they may purchase.