Posts by John Reeman
Metricon homes: Australia’s Largest Home Builder Falls Victim to Qilin Ransomware Attack
Metricon Homes, Australia’s premier residential construction company, has become the latest high-profile victim of the prolific Qilin ransomware group in a significant cyberattack that compromised sensitive corporate data. The Breach: What Happened On July 21, 2025, the Qilin ransomware operation successfully infiltrated the IT systems of Victoria-based Metricon Homes, claiming to have stolen a substantial…
READ MORE >>Token Protection in Microsoft Entra ID: A Game-Changer for Business Email Compromise Defence
As cybersecurity investigators well know, Business Email Compromise (BEC) attacks have evolved far beyond simple phishing schemes. Today’s sophisticated threat actors have mastered the art of token theft and manipulation, allowing them to maintain persistent access to victim systems even after passwords have been changed. This presents a significant challenge for organisations and investigators alike…
READ MORE >>Welcome to the “Cybersecurity Loop” – Edition #12
Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this month — and what you should be thinking about. 🧨 HOT this month…
READ MORE >>Qilin Ransomware: The Criminal Enterprise Redefining Cyber Extortion
CYBERSECURITY ALERT: When Ransomware Groups Start Offering “Legal Advice”
The Qilin ransomware group has crossed a disturbing new threshold—they’re now providing legal advisory services to their affiliates on how to maximize extortion pressure.
Uncovering and Eliminating RC4 Weak Ciphers in Active Directory
Overview Active Directory (AD) environments often harbour legacy cryptographic vulnerabilities that can expose organisations to significant security risks. One of the most persistent and dangerous of these is the continued use of RC4 encryption for Kerberos authentication. This article explores how to identify RC4 usage in your environment, the security implications, and provides a strategic…
READ MORE >>Highly Malicious MacOS Infostealer
This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…
READ MORE >>Top Australian Cybersecurity Blog
🏆 𝐖𝐞’𝐯𝐞 𝐛𝐞𝐞𝐧 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞𝐝! 🏆 Cyooda Security has been named one of the 𝐓𝐨𝐩 🔟 𝐀𝐮𝐬𝐭𝐫𝐚𝐥𝐢𝐚𝐧 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐁𝐥𝐨𝐠𝐬 by 𝐅𝐄𝐄𝐃𝐒𝐏𝐎𝐓! This recognition reflects our commitment to helping law firms across Australia and the Asia-Pacific stay ahead of cyber threats with practical, relevant, and trusted insights. A huge thank you to our clients, community, and…
READ MORE >>Cyber Crisis Simulations for Law Firms: Are You Ready?
Are You Ready for the Next Cyber Attack? When a cyber breach hits your firm, the first 72 hours will define your future. Panic, silence, or poor decisions can do more damage than the attackers themselves. That’s where cyber crisis simulations step in—not as a checkbox exercise, but as a mission-critical rehearsal that can make…
READ MORE >>Welcome to the “Cybersecurity Loop” – Edition #11
Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week — and what you should be thinking about. 🧨 HOT this…
READ MORE >>The Ultimate Guide to becoming a CISO
The Journey to becoming a Chief Information Security Officer (CISO) As cybersecurity threats grow more complex and pervasive, the role of the Chief Information Security Officer (CISO) has become a cornerstone of most enterprise organisations. For aspiring cybersecurity professionals, reaching the CISO level represents both a significant challenge and a rewarding culmination of their career. …
READ MORE >>