<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber threats Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/cyber-threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/cyber-threats/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 15 Aug 2024 04:23:56 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>cyber threats Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/cyber-threats/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Staying Safe Online: Lessons from the Case of the &#8220;Evil Twin&#8221;</title>
		<link>https://www.vertexcybersecurity.com.au/staying-safe-online-lessons-from-the-case-of-the-evil-twin/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=staying-safe-online-lessons-from-the-case-of-the-evil-twin</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 24 Jul 2024 06:36:43 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[MFA (multi-factor authentication)]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Cyber Crime Prevention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[Digital Privacy]]></category>
		<category><![CDATA[Evil Twin Networks]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Public Wi-Fi]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8314</guid>

					<description><![CDATA[The recent apprehension of a man accused of creating &#8220;evil twin&#8221; Wi-Fi networks to steal personal information has highlighted the ongoing threat of cyber crimes. As we increasingly rely on digital connectivity, it&#8217;s crucial to adopt practices that enhance our online security. Here’s how you can keep yourself safe online, drawing lessons from the case [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Rootkit Testing: A Vital Element of Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/rootkit-testing-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rootkit-testing-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 06 May 2024 05:49:39 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[Rootkit Detection]]></category>
		<category><![CDATA[Security Testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7917</guid>

					<description><![CDATA[Introduction In the realm of cyber security, staying ahead of malicious actors is paramount. Penetration testing, a crucial aspect of fortifying digital defences, involves simulating cyber attacks to identify vulnerabilities. Among the various threats lurking in the digital landscape, rootkits pose a significant challenge. In this blog, we delve into the intricacies of rootkit testing [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing in Cyber Security: Significance, Methods and Impact</title>
		<link>https://www.vertexcybersecurity.com.au/the-significance-of-penetration-testing-in-cybersecurity-understanding-methods-and-impact/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-significance-of-penetration-testing-in-cybersecurity-understanding-methods-and-impact</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Sun, 03 Dec 2023 02:24:31 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7539</guid>

					<description><![CDATA[In an era marked by digital advancements, cyber security remains a paramount concern for individuals and organisations alike. Among the myriad strategies employed to safeguard sensitive data and digital infrastructure, penetration testing stands out as a crucial methodology. This proactive approach serves as a litmus test for identifying vulnerabilities within systems before malicious actors exploit [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Unlocking the Power of Cloud Infrastructure Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/unlocking-the-power-of-cloud-infrastructure-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=unlocking-the-power-of-cloud-infrastructure-penetration-testing</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Wed, 04 Oct 2023 06:17:37 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=6990</guid>

					<description><![CDATA[What is the Purpose of Cloud Penetration Testing? Cloud penetration testing&#160;is designed to assess the strengths and weaknesses of a cloud system to improve its overall security posture. Cloud penetration testing helps to: In the ever-evolving landscape of cybersecurity, cloud infrastructure penetration testing has emerged as a crucial safeguard for Australian businesses relying on cloud [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Blue Teaming: Strengthening Cyber Security Defences</title>
		<link>https://www.vertexcybersecurity.com.au/blue-teaming-strengthening-cyber-security-defences/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=blue-teaming-strengthening-cyber-security-defences</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 19 May 2023 01:41:59 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[blue teaming]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[defence strategies]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5934</guid>

					<description><![CDATA[In today&#8217;s rapidly evolving digital landscape, cyber threats pose a significant risk to organisations of all sizes. As cyber criminals become more sophisticated, it is crucial for businesses to adopt proactive approaches to safeguard their digital assets. Blue teaming, a critical component of cyber security, plays a pivotal role in defending against these ever-evolving threats. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>October Is National Cybersecurity Month</title>
		<link>https://www.vertexcybersecurity.com.au/october-is-national-cybersecurity-month/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=october-is-national-cybersecurity-month</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Mon, 11 Oct 2021 18:37:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security month]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3936</guid>

					<description><![CDATA[Each year in October, organisations celebrate National Cybersecurity Month and spread awareness of the importance of strong cybersecurity infrastructure to protect against cyber attacks.&#160; For this year’s National Cybersecurity Month, here are some ideas on how your organisation and employees can have a stronger security posture: Educate your staff on phishing emails and dangerous links. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Kaseya Ransomware Attack &#038; Zero Trust</title>
		<link>https://www.vertexcybersecurity.com.au/zero-trust-strategy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=zero-trust-strategy</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 12:39:57 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[kaseya]]></category>
		<category><![CDATA[ransom]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3843</guid>

					<description><![CDATA[News of the ransomware attack on Kaseya was widespread, since the attack took place over the American Fourth of July weekend in 2021. The attackers used a vulnerability in the company’s remote monitoring tool, exploiting a zero day vulnerability that impacted more than 1,000 businesses in several countries, stalling business operations. This type of attack [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Let’s Talk About Cyber Attacks</title>
		<link>https://www.vertexcybersecurity.com.au/protect-against-a-cyber-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-against-a-cyber-attack</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 07:48:32 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3784</guid>

					<description><![CDATA[Back in 2021 there were a few weeks of significant cyber attacks, including the Colonial Pipeline and JBS Meats attacks in the U.S., and the Nine Entertainment breach in Australia. These attacks demonstrate the urgent need for organisations need to take immediate steps to implement tools and procedures to protect their systems from breaches. Here [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>What You Need to Know About the Microsoft Exchange Server Hack</title>
		<link>https://www.vertexcybersecurity.com.au/what-you-need-to-know-about-the-microsoft-exchange-server-hack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-you-need-to-know-about-the-microsoft-exchange-server-hack</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 15:43:52 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security audit]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[cybersecurity audit]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3737</guid>

					<description><![CDATA[Microsoft Exchange Server, a Microsoft product for small and medium-sized businesses that offers email, calendar, and collaboration functionality, recently had four zero-day bugs that made the system vulnerable to attacks, beginning in early January. Vertex Cyber Security has helped many companies that have been hacked including many hacked using the Microsoft Exchange vulnerabilities. Are you [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Top Cyber Security Trends for 2021</title>
		<link>https://www.vertexcybersecurity.com.au/top-cyber-security-trends-for-2021/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-cyber-security-trends-for-2021</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 15:32:47 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber scam]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3716</guid>

					<description><![CDATA[Already several months into 2021, and based on collected data, some trends are emerging when it comes to cybersecurity. Check out these top cyber security trends for 2021 and how they can impact your organisation.&#160; The cyber attack surface is increasing. According to Forbes, due to a rapid digital transformation prompted by COVID-19 and the [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
