Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

In the News

19 September 2023

Finance boss at Insignia Financial says staff should be SACKED…

October 2022

Expert’s tips to avoid being scammed after pensioner loses life savings.

The Two Million Dollar Vercel Breach: Why Your AI Tools Must Prioritise Cyber Security First

The two million dollar Vercel breach highlights the dangers of granting broad permissions to AI tools. Learn why your organisation needs a security-first approach to AI adoption and third-party risk.

Read More »
21 April 2026

5,600 Sensitive Documents Stolen: Lessons from the NSW Treasury Insider Data Breach

A significant data breach at the NSW Treasury involving 5,600 documents highlights the danger of insider threats. Learn how to enhance your organisation’s security monitoring.

Read More »
21 April 2026

The Digital High: Why Cyber Hacking is So Addictive for Beginners

Explore the psychological reasons why cyber hacking is so addictive for beginners, the dangerous cycle of criminal escalation, and why cybercrime never pays in the long run.

Read More »
20 April 2026

The PowerSchool Ransomware Heist: Why a 20-Year-Old is Heading to Federal Prison

A 20-year-old receives 4 years in prison for the historic PowerSchool breach. Learn how teenage hackers are recruited on gaming platforms and why cybercrime never pays.

Read More »
20 April 2026

Why Publicly Sharing Bank Details Puts Your Business at Risk

Discover why publicly listing your bank details can lead to targeted phishing attacks and learn safer strategies for receiving business payments.

Read More »
20 April 2026

Why the “SaaS is Dead” Narrative Fails the Math Test

Explore why the “SaaS is dead” narrative fails to account for the real costs of infrastructure, maintenance, and cyber security in the age of AI.

Read More »
17 April 2026

Booking.com Security Incident: Is Your Web Platform Truly Secure?

The recent Booking.com security incident highlights the risks of insecure web APIs. Learn how to protect your organisation from similar data breaches and phishing attacks.

Read More »
14 April 2026

When the Protectors are Targeted: Why the Full Scale of Cyber Attacks is Being Hidden from Public View

Recent reports indicate that major cyber firms may be withholding information on nation-state attacks to avoid retaliation. Discover how this lack of transparency affects your business security.

Read More »
13 April 2026

The New Yorker Exposé and the Question of Integrity of Sam Altman: Why Your Business Should Rethink its use of OpenAI

A recent New Yorker report raises serious questions about Sam Altman’s leadership at OpenAI. Discover why trust is essential in cybersecurity and why your business should consider AI alternatives.

Read More »
12 April 2026

From Fake Funerals to Federal Prison: Why the Path of the Scammer is a Financial and Moral Dead End

A 27 million dollar scam ring was recently dismantled in a fake funeral sting. Explore the economic and personal reasons why cyber crime is a path to failure.

Read More »
7 April 2026

Cybersecurity and the Power of Delayed Gratification: Why Secure Companies Win in the Long Term

Explore how the principle of delayed gratification applies to cybersecurity and why companies that invest in long-term protection are more likely to achieve sustained success.

Read More »
7 April 2026
blank
AI Malware

Patch Your Axios Node.js Immediately: What the Axios Attack Reveals About the Future of Open Source Security

The Axios attack highlights how AI is increasing malware sophistication. Learn why urgent patching, key rotation, and a new open-source funding model are necessary.

Read More »
1 April 2026
Load More

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd (ABN: 67 611 787 029). Vertex is a private company (beneficially owned by the Boyd Family Trust).

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Cammeraygal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.