Metricon homes: Australia’s Largest Home Builder Falls Victim to Qilin Ransomware Attack

Metricon Qilin Ransomware

Metricon Homes, Australia’s premier residential construction company, has become the latest high-profile victim of the prolific Qilin ransomware group in a significant cyberattack that compromised sensitive corporate data. The Breach: What Happened On July 21, 2025, the Qilin ransomware operation successfully infiltrated the IT systems of Victoria-based Metricon Homes, claiming to have stolen a substantial…

READ MORE >>

Token Protection in Microsoft Entra ID: A Game-Changer for Business Email Compromise Defence

Tokens and business email compromise

As cybersecurity investigators well know, Business Email Compromise (BEC) attacks have evolved far beyond simple phishing schemes. Today’s sophisticated threat actors have mastered the art of token theft and manipulation, allowing them to maintain persistent access to victim systems even after passwords have been changed. This presents a significant challenge for organisations and investigators alike…

READ MORE >>

Welcome to the “Cybersecurity Loop” – Edition #12

Cybersecurity Loop Newsletter #12

Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this month — and what you should be thinking about. 🧨 HOT this month…

READ MORE >>

Uncovering and Eliminating RC4 Weak Ciphers in Active Directory

Eliminate the curse of RC4

Overview Active Directory (AD) environments often harbour legacy cryptographic vulnerabilities that can expose organisations to significant security risks. One of the most persistent and dangerous of these is the continued use of RC4 encryption for Kerberos authentication. This article explores how to identify RC4 usage in your environment, the security implications, and provides a strategic…

READ MORE >>

Highly Malicious MacOS Infostealer

Infostealer Alert

This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…

READ MORE >>

Top Australian Cybersecurity Blog

Top Australian Cyber Security Blog 2025

🏆 𝐖𝐞’𝐯𝐞 𝐛𝐞𝐞𝐧 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞𝐝! 🏆 Cyooda Security has been named one of the 𝐓𝐨𝐩 🔟 𝐀𝐮𝐬𝐭𝐫𝐚𝐥𝐢𝐚𝐧 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐁𝐥𝐨𝐠𝐬 by 𝐅𝐄𝐄𝐃𝐒𝐏𝐎𝐓! This recognition reflects our commitment to helping law firms across Australia and the Asia-Pacific stay ahead of cyber threats with practical, relevant, and trusted insights. A huge thank you to our clients, community, and…

READ MORE >>

Cyber Crisis Simulations for Law Firms: Are You Ready?

72-hour Cyber Crisis Response Kit

Are You Ready for the Next Cyber Attack? When a cyber breach hits your firm, the first 72 hours will define your future. Panic, silence, or poor decisions can do more damage than the attackers themselves. That’s where cyber crisis simulations step in—not as a checkbox exercise, but as a mission-critical rehearsal that can make…

READ MORE >>

Welcome to the “Cybersecurity Loop” – Edition #11

Cybersecurity Loop Newsletter #11

Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week — and what you should be thinking about. 🧨 HOT this…

READ MORE >>

The Ultimate Guide to becoming a CISO

The journey to become a CISO

The Journey to becoming a Chief Information Security Officer (CISO) As cybersecurity threats grow more complex and pervasive, the role of the Chief Information Security Officer (CISO) has become a cornerstone of most enterprise organisations. For aspiring cybersecurity professionals, reaching the CISO level represents both a significant challenge and a rewarding culmination of their career. …

READ MORE >>