Posts by John Reeman
Beyond the Gateway: Why Traditional Email Security Can’t Stop BEC Attacks Targeting M&A Deals and Trust Accounts
Welcome to the world of modern Business Email Compromise (BEC), where the attack vector isn’t a malicious payload, but elaborately constructed deception that exploits the very trust relationships that make business possible.
READ MORE >>The Hidden Battlefield: Why Traditional EDR Leaves Your Identity Layer Exposed
Modern cybersecurity has a blind spot problem. Organisations invest heavily in Endpoint Detection and Response (EDR) solutions, believing they’ve fortified their defences. Yet attackers continue to move laterally through networks, escalating privileges and exfiltrating data often without triggering a single alert. The reason? EDR tools excel at monitoring endpoints, but they fundamentally cannot see what…
READ MORE >>Digital Forensic Evidence Collection for Insider Threat Cases: Legal Guide 2025
Insider threats have fundamentally transformed with the proliferation of cloud computing, remote work arrangements and sophisticated data management systems. Unlike external cyber security breaches, insider threats involve individuals with legitimate system access who misuse their privileges. This creates unique challenges for legal practitioners, as the line between authorised and unauthorised activity can be subtle, requiring careful analysis of digital footprints to establish intent and scope of misconduct.
READ MORE >>Welcome to the “Cybersecurity Loop” – Edition #13
Now, before we unpack this month’s stories, just a quick note to let you know that we will be on Stand #55 at the ALPMA Summit 2025 in Sydney, 3 – 5 September. This year, for every person who visits our stand and plays our “Data Booster” game, you get a chance to win a…
READ MORE >>Cyooda Featured in the LawyersWeekly Legal Operations Guide 2025
Cyooda Proud to be Featured as the ONLY Cybersecurity Provider in Lawyers Weekly’s Legal Operations Guide 2025. We’re thrilled to announce that Cyooda has been selected as the exclusive cybersecurity provider featured in Lawyers Weekly’s prestigious Legal Operations Guide 2025. This recognition highlights our specialised expertise in protecting law firms from the ever-evolving landscape of…
READ MORE >>Digital Forensics: A Comprehensive Guide to Investigation, Recovery, and Analysis
Digital forensics has become increasingly critical as our world becomes more digitised. From smartphones and laptops to IoT devices and cloud storage, digital evidence can be found everywhere. Understanding digital forensics is essential for law enforcement, corporate security teams, legal professionals, and IT administrators who may need to investigate security incidents or recover lost data.
READ MORE >>The Hidden Deal Breaker: Why Cybersecurity is Critical for M&A Success
Over the last 5 years mergers and acquisitions represent more than just financial transactions. They’re complex integrations of digital ecosystems, data repositories, and cyber risk profiles. While traditional M&A due diligence focuses heavily on financial performance, market position and operational synergies, cybersecurity has emerged as a make-or-break factor that can determine whether a deal creates…
READ MORE >>Metricon homes: Australia’s Largest Home Builder Falls Victim to Qilin Ransomware Attack
Metricon Homes, Australia’s premier residential construction company, has become the latest high-profile victim of the prolific Qilin ransomware group in a significant cyberattack that compromised sensitive corporate data. The Breach: What Happened On July 21, 2025, the Qilin ransomware operation successfully infiltrated the IT systems of Victoria-based Metricon Homes, claiming to have stolen a substantial…
READ MORE >>Token Protection in Microsoft Entra ID: A Game-Changer for Business Email Compromise Defence
As cybersecurity investigators well know, Business Email Compromise (BEC) attacks have evolved far beyond simple phishing schemes. Today’s sophisticated threat actors have mastered the art of token theft and manipulation, allowing them to maintain persistent access to victim systems even after passwords have been changed. This presents a significant challenge for organisations and investigators alike…
READ MORE >>Welcome to the “Cybersecurity Loop” – Edition #12
Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this month — and what you should be thinking about. 🧨 HOT this month…
READ MORE >>