NewsBite

Cyber warfare

October

Hacker software open on a laptop: companies are not going to get a safe harbour.

The new cybersecurity bills will do nothing to create trust

Companies need to know that information revealed in a cybersecurity emergency won’t be used to sue them. These bills don’t offer much assurance.

  • Lesley Seebeck

September

Cocoon chief executive Trent Telford in Washington.

Aussie cyber firm goes it alone with US expansion

Trent Telford is on a high after his firm Cocoon Data scored a Google deal and made progress cracking the US market, but he says it’s no thanks to the Australian government.

  • Matthew Cranston

August

Tehran has long threatened to retaliate against Donald Trump over the 2020 drone strike he ordered that killed prominent Revolutionary Guard General Qassem Soleimani.

Trump’s campaign says its emails were hacked

The former president’s team accused Iran of stealing sensitive internal documents, a day after Microsoft warned of foreign interference in the US election.

  • Bill Barrow

July

A new battleground: Why companies need a digital bodyguard

New cybersecurity threats and the targeting of senior executives have prompted businesses to adopt a ‘whole of organisation’ approach.

  • Ben Powell
Medibank is facing increasing legal challenges related to a 2022 data breach.

Huge cyber fines to be ‘Ford Pinto’ moment Australian business needs

The threat of business-crushing penalties could change the economics of storing sensitive data and cybersecurity investment.

  • Paul Smith
Advertisement
Home Affairs Minister Clare O’Neil is leading the government’s cybersecurity efforts in cabinet.

Cyber is our fastest growing national security threat: O’Neil

The Home Affairs Minister says Labor’s plans to boost Australia’s defences against increasing online risks are already delivering results.

  • Tom McIlroy
The hacker was able to obtain the data after accessing an AT&T system through a third-party cloud platform, according to AT&T’s disclosure.

AT&T hack undermines US national security, experts say

The telco giant said a hacker had compromised its network and stolen records of calls and text messages from nearly all of its 100 million wireless customers.

  • Ryan Gallagher
Australia’s Deputy Prime Minister Richard Marles arrives at an event commemorating the 75th anniversary of NATO this week.

New ‘alliance’ calls out China’s bad cyber behaviour

Months of behind-the-scenes work helped convince Japan and South Korea to join an Australian-led statement slamming China over cyberattacks.

  • Andrew Tillett
For the first time, Australia is mentioning shadowy Chinese cyber wardare organisations by name.

Asian allies key to our cyberdefence against China

Japan and South Korea have for the first time joined Five Eyes allies led by Australia in directly calling out Chinese cyberattacks, but more can be done.

  • Alastair MacGibbon
APT40 is based on the Chinese island province of Hainan in the south of the country.

Who are the Chinese hackers named by Australia?

They are based in China’s south and have allegedly operated via a front company called the Hainan Xiandun Technology Development Co.

  • Nick Bonyhady
Foreign Minister Penny Wong has criticised malicious foreign cyber activities.

Labor under pressure to confront China over hacking

The government is under pressure to confront Beijing after its main counterintelligence agency named a hacking group linked to China’s Ministry of State Security.

  • Updated
  • Tom McIlroy and Nick Bonyhady
xx

Chinese hackers unveiled; Telstra hikes prices; Bapcor shuns $1.8b bid

Read everything that’s happened in the news so far today.

Why you shouldn’t set a deadline if you want to be more resilient

The strongest leaders believe in themselves and don’t try to set timelines for when a difficult period will pass, says Macquarie Technology Group CEO David Tudehope.

  • Updated
  • Ciara Seccombe and Lap Phan

June

Hackers claim to have stolen the emails of Northern Minerals managing director Shane Hartwig. Pictured alongside executive chairman Adam Handley.

Rare earths miner hacked after Chinese investors ordered out

A ransomware group has posted CEO emails and sensitive commercial data from miner Northern Minerals on the dark web after Chinese investors were ordered to sell.

  • Paul Smith, Elouise Fowler and Andrew Tillett
The Australian Defence Force has previously been reliant on small-scale drones manufactured by Chinese firm DJI.

Risk for critical infrastructure over China-manufactured drones

Australian critical infrastructure is at risk of spying and disruption with a lack of government guidance over the growing use of unmanned drones to monitor and carry out menial work, new research says.

  • Max Mason
Advertisement

May

Xi Jinping has a reason to be angry with Joe Biden, and that might signal that what Biden’s doing is the right path.

The next Cold War is taking place in a chilled data centre

Any doubt AI is now the most significant national security issue for the US and China was laid to rest this month.

  • Matthew Cranston
Microsoft CEO Satya Nadella.

Microsoft CEO should be fired over cyber failure

A cyber breach slammed by the US government for leaving customers exposed is down to a culture led by Satya Nadella of profit over security.

  • James Turner
ClubsNSWis dealing with the fallout of a data breach of a third-party IT provider.

Man arrested in Sydney’s west over clubs data breach

Disgruntled software developers who claim not to have been paid are being blamed for releasing details of more than 1 million pub and club patrons in NSW.

  • Updated
  • Max Mason, David Marin-Guzman and Zoe Samios

April

X owner Elon Musk has been in an escalating war of words with Australian politicians and regulators.

Corporate directors warned over Musk behaviour

AFP boss Reece Kershaw says better corporate standards are needed to enable co-operation between social media giants and law enforcement.

  • Tom McIlroy

‘Safe room for terrorists’: ASIO warns big tech on encryption

Federal spy and crime chiefs will demand access to social messaging systems that allow terrorists, violent extremists and child abusers to operate with impunity.

  • Jacob Greber

Original URL: https://www.afr.com/topic/cyber-warfare-1mow