2019 Annual Report and AGM | Red Piranha


Our 2019 Annual Report is ready for review for our shareholders. If you would like to request a copy please email us at investor@redpiranha.net.

Posted on Nov 19, 2019

Red Piranha Crystal Eye Launch in New York


Red Piranha is excited to invite you to join us in New York as we officially launch Australia’s first Cybersecurity Unified Threat Management product Crystal Eye, designed and developed for MSPs and SMEs.


...

Posted on Nov 18, 2019

Maritime cybersecurity concerns for compliance, insurance and safety

As naval vessels and offshore assets become increasingly connected, there is a reliance on networked systems for the efficiency and safety of operations. 

Posted on Nov 12, 2019

Threat Intelligence Report - November 4-10 2019

TRENDS The top attacker country was China with 2594 unique attackers (36%). The top Exploit event was Authentication with 37% of occurrences. The top Trojan C&C server detected was Heodo with 26 instances detected. The most prevalent malware detected was Bitcoin Miner xme64-2141.exe, first seen 10th March 2019.

Posted on Nov 11, 2019

Threat Intelligence Report - October 28 - November 3 2019

TRENDS The top attacker country was China with 2090 unique attackers (34%). The top Exploit event was Authentication with 50% of occurrences. The top Trojan C&C server detected was Trickbot with 65 instances detected. The most prevalent malware detected was Bitcoin Miner xme64-2141.exe, first seen 10th March 2019.

Posted on Nov 5, 2019

3 Pillars of ISMS

Every day, you might use a mobile device to make voice calls, send text messages, post articles on social media platform, and access information on the web. You likely also use a laptop or tablet to communicate, perform work, store work files, video conference, or watch recorded files. Your personal and work data are recorded on these devices moment-by-moment. These files are backed up in local as well as offsite infrastructure. Each new device doesn’t just drive traffic, it also dramatically expands the network attack surface - increasing the opportunity for cybercriminals to leverage sophisticated methods to exploit these opportunities. As a result, we are seeing the rise in cybercrime, and cybersecurity incidents that exploit data found on your devices, on-premises systems, as well as offsite cloud infrastructure. 

Posted on Oct 29, 2019

Threat Intelligence Report - October 21-27 2019

TRENDS The top attacker country was China with 2639 unique attackers (32%). The top Exploit event was Authentication with 54% of occurrences. The top Trojan C&C server detected was Trickbot with 65 instances detected. The most prevalent malware detected was Bitcoin Miner xme64-2141.exe, first seen 10th March 2019.

Posted on Oct 29, 2019