Stay Ahead of Cyber Threats with Expert Insights

Practical cybersecurity guidance, incident response expertise, and industry intelligence for Australian law firms and businesses.

Get the 'Cybersecurity Loop' newsletter delivered to your inbox:

The Cyber Security Loop Newsletter

CYOODA - Newsletter

Welcome to the “Cybersecurity Loop” – Edition #13

Now, before we unpack this month's stories, just a quick note to let you know that we will be on Stand #55 at the ALPMA Summit 2025 in Sydney, 3...
Read More about Welcome to the “Cybersecurity Loop” – Edition #13

Welcome to the “Cybersecurity Loop” – Edition #12

Every few weeks, I share a quick pulse on what's happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as...
Read More about Welcome to the “Cybersecurity Loop” – Edition #12

Welcome to the “Cybersecurity Loop” – Edition #11

Every few weeks, I share a quick pulse on what's happening in the world of cybersecurity - framed for law firm leaders and risk stakeholders across Australia. Think of it...
Read More about Welcome to the “Cybersecurity Loop” – Edition #11

Thoughts and articles by Cyooda

All
  • All
  • Cybersecurity
  • Detection Engineering
  • How To Guides
  • Ransomware Insights
  • Security Insights

Australian Clinical Labs Case: Lessons in Cyber Response & Communication

The judgment in brief In this case, ACL acquired the assets of Medlab Pathology Pty Ltd on 19 December 2021. It assumed control of Medlab's IT systems, which over 223,000...
Read More about Australian Clinical Labs Case: Lessons in Cyber Response & Communication

Beyond the Gateway: Why Traditional Email Security Can’t Stop BEC Attacks Targeting M&A Deals and Trust Accounts

The email your conveyancing solicitor just received looks perfect. It's a continuation of an existing thread about a property settlement, references the correct property address, includes previous conversation history, and...
Read More about Beyond the Gateway: Why Traditional Email Security Can’t Stop BEC Attacks Targeting M&A Deals and Trust Accounts

The Hidden Battlefield: Why Traditional EDR Leaves Your Identity Layer Exposed

Modern cybersecurity has a blind spot problem. Organisations invest heavily in Endpoint Detection and Response (EDR) solutions, believing they've fortified their defences. Yet attackers continue to move laterally through networks,...
Read More about The Hidden Battlefield: Why Traditional EDR Leaves Your Identity Layer Exposed

Digital Forensic Evidence Collection for Insider Threat Cases: Legal Guide 2025

In today's digital workplace, insider threats represent one of the most challenging aspects of corporate litigation and dispute resolution. Whether dealing with intellectual property theft, policy violations, fraud, or employee...
Read More about Digital Forensic Evidence Collection for Insider Threat Cases: Legal Guide 2025

Cybersecurity news from around the world

CISA orders feds to patch Windows Server WSUS flaw used in attacks

The Cybersecurity and Infrastructure Security Agency (CISA) ordered U.S. government agencies to patch a critical-severity Windows Server Update Services (WSUS) vulnerability after adding it to its catalog of security flaws...
Read More about CISA orders feds to patch Windows Server WSUS flaw used in attacks

Amazon: This week’s AWS outage caused by major DNS failure

Amazon says a major DNS failure was behind a massive AWS (Amazon Web Services) outage that took down many websites and online services on Monday. As BleepinComputer reported earlier this...
Read More about Amazon: This week’s AWS outage caused by major DNS failure

New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow unauthorized access to sensitive data. The vulnerability, tracked...
Read More about New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware attacks likely orchestrated by Storm-2603 (aka CL-CRI-1040 or Gold Salem), which is...
Read More about Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

Apple now offers $2 million for zero-click RCE vulnerabilities

Apple is announcing a major expansion and redesign of its bug bounty program, doubling maximum payouts, adding new research categories, and introducing a more transparent reward structure. Since the program launched in...
Read More about Apple now offers $2 million for zero-click RCE vulnerabilities

Deepfake Awareness High at Orgs, But Cyber Defenses Badly Lag

AI-augmented deepfakes are becoming more and more common in cyberattacks on businesses and government agencies, and most organizations are aware of the danger. However, there's a preparation paradox at work:...
Read More about Deepfake Awareness High at Orgs, But Cyber Defenses Badly Lag

Boyd Gaming discloses data breach after suffering a cyberattack

US gaming and casino operator Boyd Gaming Corporation disclosed it suffered a breach after threat actors gained access to its systems and stole data, including employee information and data belonging...
Read More about Boyd Gaming discloses data breach after suffering a cyberattack

Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Law enforcement authorities in Europe have arrested five suspects in connection with an "elaborate" online investment fraud scheme that stole more than €100 million ($118 million) from over 100 victims...
Read More about Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries