Incident Response | Playbook Effectiveness | Threat Evolution Incident response playbooks: Turning theoretical plans into effective real-life responses
AI Security Risks | Cybersecurity Threats | Data Exfiltration Techniques CometJacking: Single Click Transforms Perplexity’s Comet AI Browser into Data Stealer
Malicious Software | Open Source Risks | Security Vulnerabilities First malicious AI-MCP server discovered
Cybersecurity Threats | Industrial IoT Vulnerabilities | SMS Phishing Campaigns Industrial cellular routers in Australia exploited for smishing attacks
Mobile Security | Phishing Threats | User Awareness Phishing is shifting from email to mobile – Is your staff training keeping up?
Information Sharing | Organizational Concerns | Workforce Management US government shutdown affecting CISA hampers threat-intelligence sharing
Malware Campaign | Phishing Attacks | WhatsApp Propagation New self-replicating WhatsApp malware called SORVEPOTEL
Cybersecurity Threats | Living-off-the-Land Techniques | Ransomware Tactics Ransomware-As-A-Service (RAAS) malware changing tactics – again
Machine Learning Security Risks | Security Controls and Best Practices | Supply Chain Threats When loading a machine learning model means loading an assailant
Android Spyware | Cybersecurity Threats | Social Engineering Techniques Android spyware masquerading as Signal encryption plugins
Data Breaches | Malware Evolution | Ransomware Attacks KillSec and Yurei execute successful ransomware attacks
API Exploitation | Identity and Access Management | Security Vulnerability OneLogin vulnerability allows API key exploits to obtain OIDC secrets and impersonate applications
AI Cybersecurity Concerns | AI Threat Mitigation Strategies | AI Vulnerabilities Increasing concerns about AI cybersecurity
Cybersecurity Risks | Enterprise Vulnerabilities | Software Support Lifecycle Windows 10 EOL threatens enterprise security networks
AI Education | Student Resources | Technology Access UNE Armidale to provide artificial intelligence tools to all students
Digital Identity | Fraud Prevention | Telecommunications Regulation ACMA suggests Digital ID identification verification to buy prepaid mobile SIM cards
Cybersecurity | Software Exploitation | Vulnerabilities Concerning vulnerability found in GoAnywhere MFT
Cybersecurity Threats | Exploitation of Vulnerabilities | Malware Distribution Detour Dog Operating DNS-Based Malware Production Facility for Strela Stealer
Brain-Computer Interface | Device Security | Risk Management Brain-Computer Interfaces (BCIs): Sources of Fear or Inspiration?
Advanced Malware Techniques | Cloud-Native Security Threats | DDoS Operations Advanced ShadowV2 DDoS-as-a-service botnet operating in the cloud
Cyber Espionage | Malware Analysis | Targeted Attacks BRICKSTORM cyberespionage malware detected within network infrastructure
Emergency Services Impact | Incident Accountability | Network Management Optus claims traffic not redirected from firewall before upgrade
Cybersecurity Threats | National Security Risks | Telecommunications Fraud US Secret Service discovers SIM card farm near the UN in NYC
Cybersecurity | Intelligence Sharing | Technology Partnerships Cisco’s collaboration with Splunk and Australian Signals Directorate to enhance threat intelligence sharing
Data Security in Untrusted Environments | Data Sovereignty | Protection of AI and Machine Learning Data Sets Confidential computing protects data during processing
Cybersecurity Incident | Data Breach | Supply Chain Management BMW acknowledges cyber incident, safety audit documents released by hacker
Airport Disruption | Cyber Attack | Flight Cancellations Collins Aerospace cyberattack critical alert for Australian airports
Airport Disruption | Cyberattack | Flight Cancellations | Supply Chain Attacks European airports disrupted by supply chain cyberattack
Emergency Services | Investigation Findings | Telecommunications Outage Optus Triple Zero incident “unlikely” to have contributed to baby’s death
Emergency Services Communication | Incident Response and Management | Network Outage Thirteen-hour outage of Triple Zero service due to Optus firewall upgrade
Cybersecurity Threats | Data Breaches | Ransomware Attacks Heidelberg Golf Club reportedly targeted by Kairos ransomware group
Malware Delivery | Phishing Attacks | Social Engineering FileFix attack tricks users into opening infected images
Cyber Incident Trends | Government Cyber Security Investments | Third-Party System Vulnerabilities Cyber incidents in New South Wales government related to third parties have increased fourfold over the past two years
Facial Recognition Technology | Fraud Detection | Privacy Breach Kmart Australia’s implementation of facial recognition technology violated privacy protections
Deepfakes | Gender-Based Abuse | Legislation NSW government prohibits production / distribution of sexually explicit deepfake content
Data Protection Why Organizations Still Struggle to Protect Our Data: Insights from Privacy Professionals