Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

NEWS

Loading...

May • 19 • 2026

The Real Cost of Managing Internet-Facing Servers: Lessons from the Latest Microsoft Exchange Vulnerabilities

Discover why managing internet-facing servers is becoming increasingly difficult following...
READ MORE

May • 19 • 2026

The MiniPlasma Threat: How a Resurfaced Windows Zero-Day Exploit Puts Enterprise Systems at Risk

Discover how the new Windows MiniPlasma zero-day exploit resurfaces a...
READ MORE

May • 19 • 2026

Can You Trust a Hacker’s Promise? The Reality Behind the Canvas Data Breach Ransom Payment

Instructure paid hackers for digital confirmation of data destruction after...
READ MORE

May • 19 • 2026

How AI Helped Researchers Crack Apple Security in Five Days: The Rise of AI-Driven Cyber Threats

Learn how security researchers paired with advanced AI to bypass...
READ MORE

May • 18 • 2026

Why Linus Torvalds Rejects Artificial Intelligence Bug Reports: The Hidden Costs of Automated Cybersecurity

Discover why Linus Torvalds criticized artificial intelligence bug reports and...
READ MORE

May • 12 • 2026

The Global Redundancy Haven: Why Australian Data Centres are the Ultimate Choice for Secure Backups

Discover why Australian data centres offer the world's best location...
READ MORE

May • 11 • 2026

Why Artificial Intelligence Is Not Expert Advice

Relying on artificial intelligence for expert advice is a major...
READ MORE

May • 11 • 2026

Your Passwords Could Be Cracked in Under an Hour: The Critical Risk of Outdated MD5 Hashing

Discover why modern hardware makes traditional MD5 password hashing obsolete...
READ MORE

May • 11 • 2026

The Canvas Data Breach: How One Attack Paralysed Thousands of Schools During Finals

The Canvas hack by ShinyHunters disrupted thousands of schools during...
READ MORE

May • 11 • 2026

40% Vibe-Coding Leaves Business Vulnerable to Hackers and Data Leaks

Discover how AI-generated "vibe-coding" leaves businesses vulnerable to hackers. Learn...
READ MORE
1 2 … 63 Next »

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd (ABN: 67 611 787 029). Vertex is a private company (beneficially owned by the Boyd Family Trust).

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Cammeraygal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.