Stay Ahead of Cyber Threats with Expert Insights

Practical cybersecurity guidance, incident response expertise, and industry intelligence for Australian law firms and businesses.

The Legal Cyber Brief — monthly cyber intelligence for law firm leaders. Threats, regulatory shifts, and practical tools from the field. No fluff.

CYOODA - Newsletter

68 days. That’s how long attackers are hiding in Australian networks before anyone notices.

Your device management tool just became a weapon. This fortnight: Iran-linked hackers wipe 200,000 devices using Microsoft's own admin tools, an Australian healthcare software vendor hit by ransomware this week,...
Read More about 68 days. That’s how long attackers are hiding in Australian networks before anyone notices.

Lexis Nexis Breaches – and your data maybe in the dump

Your legal research tool just became a threat vector. This fortnight: a breach that hits law firms at the supply chain, Australia's first Federal Court cyber penalty, an elite school...
Read More about Lexis Nexis Breaches – and your data maybe in the dump

Court Transcripts offshored without authorisation

Third-party vendors are having a bad month. Court transcripts offshored without authorisation, a fintech platform leaking 444,000 borrowers' data, and mandatory ransomware reporting is now in full enforcement. Here's what...
Read More about Court Transcripts offshored without authorisation

Thoughts and articles by Cyooda

All
  • All
  • Cybersecurity
  • Detection Engineering
  • How To Guides
  • Ransomware Insights
  • Security Insights

AML Tranche 2 and Cybersecurity: Same Problem, Different Regulator

  Australian law firms are spending serious time and money preparing for AML Tranche 2. And they should be. The Anti-Money Laundering and Counter-Terrorism Financing Amendment Act 2024 brings legal...
Read More about AML Tranche 2 and Cybersecurity: Same Problem, Different Regulator

First 24 Hours Post-Breach: Key to Your Firm’s Next Year

Your Firm's First 24 Hours After a Breach Will Define the Next 12 Months In every incident I've worked, from compromised email accounts at mid-tier firms to full-scale ransomware events...
Read More about First 24 Hours Post-Breach: Key to Your Firm’s Next Year

Fractional Security Leadership: The vCISO Model for Law Firms

The security questionnaire from your largest client just landed. It's 200 questions. Your IT provider can answer maybe 40 of them. The rest require someone who understands your firm's risk...
Read More about Fractional Security Leadership: The vCISO Model for Law Firms

Penetration Testing for Law Firms: What to Expect and Why It Matters

"We got into your trust account in 2 hours." The managing partner's face shifted through several expressions - disbelief, concern, and finally something like relief that this was a test...
Read More about Penetration Testing for Law Firms: What to Expect and Why It Matters

Cybersecurity news from around the world

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in...
Read More about Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the...
Read More about Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

MITRE shares 2025’s top 25 most dangerous software weaknesses

MITRE has shared this year's top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025. The list was released...
Read More about MITRE shares 2025’s top 25 most dangerous software weaknesses

UK fines LastPass over 2022 data breach impacting 1.6 million users

The UK Information Commissioner's Office (ICO) fined the LastPass password management firm £1.2 million for failing to implement security measures that allowed an attacker to steal personal information and encrypted...
Read More about UK fines LastPass over 2022 data breach impacting 1.6 million users

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users...
Read More about MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

OpenAI discloses API customer data breach via Mixpanel vendor hack

OpenAI is notifying some ChatGPT API customers that limited identifying information was exposed following a breach at its third-party analytics provider Mixpanel. Mixpanel offers event analytics that OpenAI uses to...
Read More about OpenAI discloses API customer data breach via Mixpanel vendor hack

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. "The attacker targeted Windows Servers with...
Read More about ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are behind a massive Phishing-as-a-Service (PhaaS) platform...
Read More about  Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

The Legal Cyber Brief — monthly cyber intelligence for law firm leaders.

The Legal Cyber Brief
Monthly cyber intelligence for law firm leaders.