Stay Ahead of Cyber Threats with Expert Insights

Practical cybersecurity guidance, incident response expertise, and industry intelligence for Australian law firms and businesses.

Get the 'Cybersecurity Loop' newsletter delivered to your inbox:

Please enable JavaScript in your browser to complete this form.

The Cyber Security Loop Newsletter

The Cyber Security Loop Newsletter

CYOODA - Newsletter

Cybersecurity Loop Newsletter #11

Welcome to the “Cybersecurity Loop” – Edition #11

Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week – and what you should be thinking about. 🧨 HOT this…
Read More
CyberSecurity Loop - Newsletter

Cyber Security Loop – Edition #10

Each month, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week – and what you should be thinking about. 🧨 HOT THIS WEEK:…
Read More
CyberSecurity Loop Newsletter #9

Welcome to the “CyberSecurity Loop” News Bytes – Edition #9

Last week I ran a live “cybersecurity breach simulation” at the Legal Counsel Forum in Sydney. The format of the 1 hour session allowed delegates to play along as I walked them through a scenario of a data breach.  Then using my “colour code framework” we explored the essential elements that make up a well…
Read More

Thoughts and articles by Cyooda

Infostealer Alert

Highly Malicious MacOS Infostealer

This morning in between meeting I was researching prices for ...
Read More
Top Australian Cyber Security Blog 2025

Top Australian Cybersecurity Blog

🏆 𝐖𝐞'𝐯𝐞 𝐛𝐞𝐞𝐧 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞𝐝! 🏆 Cyooda Security has been named ...
Read More
72-hour Cyber Crisis Response Kit

Cyber Crisis Simulations for Law Firms: Are You Ready?

Are You Ready for the Next Cyber Attack? When a ...
Read More
The journey to become a CISO

The Ultimate Guide to becoming a CISO

The Journey to becoming a Chief Information Security Officer (CISO) ...
Read More
Top 100 CyberSecurity Blogs

The ultimate Top 100 Cyber Security Blogs in the World

This comprehensive list represents the most influential and widely-followed cybersecurity ...
Read More
IRAP Assessment

Demystifying an IRAP Assessment: Everything You Need to Know

Is your law firm looking to understand the ins and ...
Read More
Crafting an AI Policy

Unlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy

In the rapidly evolving landscape of artificial intelligence (AI), crafting ...
Read More
Defenders have to get it right 100% of the time: Attackers only Once

Attackers only have to get it right once: Defenders 100% of the time!

𝐀𝐭𝐭𝐚𝐜𝐤𝐞𝐫𝐬 𝐨𝐧𝐥𝐲 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 𝐨𝐧𝐜𝐞, 𝐝𝐞𝐟𝐞𝐧𝐝𝐞𝐫𝐬 𝐡𝐚𝐯𝐞 ...
Read More

Cybersecurity news from around the world

Over 46,000 Grafana instances exposed to account takeover bug

More than 46,000 internet-facing Grafana instances remain unpatched and exposed ...
Read More

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

The reconnaissance activity targeting American cybersecurity company SentinelOne was part ...
Read More

Germany fines Vodafone $51 million for privacy, security breaches

The German data protection authority (BfDI) has fined Vodafone GmbH, ...
Read More

Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About

Everyone has cybersecurity stories involving family members. Here's a relatively ...
Read More

RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

Cybersecurity researchers have revealed that RansomHub's online infrastructure has "inexplicably" ...
Read More

Hitachi Vantara takes servers offline after Akira ransomware attack

Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was ...
Read More

Adversarial Misuse of Generative AI

GTIG takes a holistic, intelligence-driven approach to detecting and disrupting ...
Read More

Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands

Belgian and Dutch authorities have arrested eight suspects in connection ...
Read More

Ransomware attack hits leading heart surgery device maker

Artivion, a leading manufacturer of heart surgery medical devices, has ...
Read More