Thoughts and articles by Cyooda
All
- All
- Cybersecurity
- Detection Engineering
- How To Guides
- Ransomware Insights
- Security Insights
AML Tranche 2 and Cybersecurity: Same Problem, Different Regulator
Australian law firms are spending serious time and money preparing for AML Tranche 2. And they should be. The Anti-Money Laundering and Counter-Terrorism Financing Amendment Act 2024 brings legal...
First 24 Hours Post-Breach: Key to Your Firm’s Next Year
Your Firm's First 24 Hours After a Breach Will Define the Next 12 Months In every incident I've worked, from compromised email accounts at mid-tier firms to full-scale ransomware events...
Fractional Security Leadership: The vCISO Model for Law Firms
The security questionnaire from your largest client just landed. It's 200 questions. Your IT provider can answer maybe 40 of them. The rest require someone who understands your firm's risk...
Penetration Testing for Law Firms: What to Expect and Why It Matters
"We got into your trust account in 2 hours." The managing partner's face shifted through several expressions - disbelief, concern, and finally something like relief that this was a test...
Cybersecurity news from around the world
Fractional Security Leadership: The vCISO Model for Law Firms
The security questionnaire from your largest client just landed. It's 200 questions. Your IT provider can answer maybe 40 of them. The rest require someone who understands your firm's risk...
GRU-Linked BlueDelta Evolves Credential Harvesting
The analysis cut-off date for this report was September 11, 2025 Executive Summary Between February and September 2025, Recorded Future's Insikt Group identified multiple credential-harvesting campaigns conducted by BlueDelta, a...
Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in...
Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the...
MITRE shares 2025’s top 25 most dangerous software weaknesses
MITRE has shared this year's top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025. The list was released...
UK fines LastPass over 2022 data breach impacting 1.6 million users
The UK Information Commissioner's Office (ICO) fined the LastPass password management firm £1.2 million for failing to implement security measures that allowed an attacker to steal personal information and encrypted...
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users...
OpenAI discloses API customer data breach via Mixpanel vendor hack
OpenAI is notifying some ChatGPT API customers that limited identifying information was exposed following a breach at its third-party analytics provider Mixpanel. Mixpanel offers event analytics that OpenAI uses to...
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders.