CYOODA - Newsletter
Welcome to the “Cybersecurity Loop” – Edition #11
By About John Reeman |
Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week – and what you should be thinking about. 🧨 HOT this…
Read More Cyber Security Loop – Edition #10
By John |
Each month, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week – and what you should be thinking about. 🧨 HOT THIS WEEK:…
Read More Welcome to the “CyberSecurity Loop” News Bytes – Edition #9
By John |
Last week I ran a live “cybersecurity breach simulation” at the Legal Counsel Forum in Sydney. The format of the 1 hour session allowed delegates to play along as I walked them through a scenario of a data breach. Then using my “colour code framework” we explored the essential elements that make up a well…
Read More Thoughts and articles by Cyooda
Highly Malicious MacOS Infostealer
By About John Reeman |
This morning in between meeting I was researching prices for ...
Read More Top Australian Cybersecurity Blog
By About John Reeman |
🏆 𝐖𝐞'𝐯𝐞 𝐛𝐞𝐞𝐧 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞𝐝! 🏆 Cyooda Security has been named ...
Read More Cyber Crisis Simulations for Law Firms: Are You Ready?
By About John Reeman |
Are You Ready for the Next Cyber Attack? When a ...
Read More The Ultimate Guide to becoming a CISO
By About John Reeman |
The Journey to becoming a Chief Information Security Officer (CISO) ...
Read More The ultimate Top 100 Cyber Security Blogs in the World
By About John Reeman |
This comprehensive list represents the most influential and widely-followed cybersecurity ...
Read More Demystifying an IRAP Assessment: Everything You Need to Know
By About John Reeman |
Is your law firm looking to understand the ins and ...
Read More Unlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy
By About John Reeman |
In the rapidly evolving landscape of artificial intelligence (AI), crafting ...
Read More Attackers only have to get it right once: Defenders 100% of the time!
By About John Reeman |
𝐀𝐭𝐭𝐚𝐜𝐤𝐞𝐫𝐬 𝐨𝐧𝐥𝐲 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 𝐨𝐧𝐜𝐞, 𝐝𝐞𝐟𝐞𝐧𝐝𝐞𝐫𝐬 𝐡𝐚𝐯𝐞 ...
Read More Cybersecurity news from around the world
Over 46,000 Grafana instances exposed to account takeover bug
By External News-Site | Security News
More than 46,000 internet-facing Grafana instances remain unpatched and exposed ...
Read More Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
By External News-Site | Security News
Apple has disclosed that a now-patched security flaw present in ...
Read More Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
By External News-Site | Security News
Google has stepped in to address a security flaw that ...
Read More Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
By External News-Site | Security News
The reconnaissance activity targeting American cybersecurity company SentinelOne was part ...
Read More Germany fines Vodafone $51 million for privacy, security breaches
By External News-Site | Security News
The German data protection authority (BfDI) has fined Vodafone GmbH, ...
Read More Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI
By External News-Site | Security News
Cisco has released security patches to address a critical security ...
Read More China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
By External News-Site | Security News
The China-linked threat actor behind the recent in-the-wild exploitation of ...
Read More Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats
By External News-Site | Security News
Apple on Tuesday revealed that it prevented over $9 billion ...
Read More Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About
By External News-Site | Cyber Security, Security News
Everyone has cybersecurity stories involving family members. Here's a relatively ...
Read More RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control
By External News-Site | Cyber Security, Security News
Cybersecurity researchers have revealed that RansomHub's online infrastructure has "inexplicably" ...
Read More Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products
By External News-Site | Security News
Google has revealed that it observed 75 zero-day vulnerabilities exploited ...
Read More Marks & Spencer breach linked to Scattered Spider ransomware attack
By External News-Site | Security News
Ongoing outages at British retail giant Marks & Spencer are ...
Read More Hitachi Vantara takes servers offline after Akira ransomware attack
By External News-Site | Security News
Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was ...
Read More Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score
By External News-Site | Cyber Security, Security News
Microsoft has released patches to address two Critical-rated security flaws ...
Read More Canadian charged with stealing $65 million using DeFI crypto exploits
By External News-Site | Cyber Security, Security News
The U.S. Justice Department has charged a Canadian man with ...
Read More Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists
By External News-Site | Cyber Security, Security News
Meta-owned WhatsApp on Friday said it disrupted a campaign that ...
Read More Adversarial Misuse of Generative AI
By External News-Site | Security News
GTIG takes a holistic, intelligence-driven approach to detecting and disrupting ...
Read More New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits
By External News-Site | Cyber Security, Security News
A team of security researchers from Georgia Institute of Technology ...
Read More Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands
By External News-Site | Cyber Security, Security News
Belgian and Dutch authorities have arrested eight suspects in connection ...
Read More Ransomware attack hits leading heart surgery device maker
By External News-Site | Cyber Security, Security News
Artivion, a leading manufacturer of heart surgery medical devices, has ...
Read More