Cyooda Featured in the LawyersWeekly Legal Operations Guide 2025

Cyooda Security Featured in Lawyers Weekly Legal Operations Guide 2025

Cyooda Proud to be Featured as the ONLY Cybersecurity Provider in Lawyers Weekly’s Legal Operations Guide 2025. We’re thrilled to announce that Cyooda has been selected as the exclusive cybersecurity provider featured in Lawyers Weekly’s prestigious Legal Operations Guide 2025. This recognition highlights our specialised expertise in protecting law firms from the ever-evolving landscape of…

READ MORE >>

Digital Forensics: A Comprehensive Guide to Investigation, Recovery, and Analysis

A complete guide to digital forensics

Digital forensics has become increasingly critical as our world becomes more digitised. From smartphones and laptops to IoT devices and cloud storage, digital evidence can be found everywhere. Understanding digital forensics is essential for law enforcement, corporate security teams, legal professionals, and IT administrators who may need to investigate security incidents or recover lost data.

READ MORE >>

The Hidden Deal Breaker: Why Cybersecurity is Critical for M&A Success

M&A and Cybersecurity due diligence

Over the last 5 years mergers and acquisitions represent more than just financial transactions.  They’re complex integrations of digital ecosystems, data repositories, and cyber risk profiles.  While traditional M&A due diligence focuses heavily on financial performance, market position and operational synergies, cybersecurity has emerged as a make-or-break factor that can determine whether a deal creates…

READ MORE >>

Metricon homes: Australia’s Largest Home Builder Falls Victim to Qilin Ransomware Attack

Metricon Qilin Ransomware

Metricon Homes, Australia’s premier residential construction company, has become the latest high-profile victim of the prolific Qilin ransomware group in a significant cyberattack that compromised sensitive corporate data. The Breach: What Happened On July 21, 2025, the Qilin ransomware operation successfully infiltrated the IT systems of Victoria-based Metricon Homes, claiming to have stolen a substantial…

READ MORE >>

Token Protection in Microsoft Entra ID: A Game-Changer for Business Email Compromise Defence

Tokens and business email compromise

As cybersecurity investigators well know, Business Email Compromise (BEC) attacks have evolved far beyond simple phishing schemes. Today’s sophisticated threat actors have mastered the art of token theft and manipulation, allowing them to maintain persistent access to victim systems even after passwords have been changed. This presents a significant challenge for organisations and investigators alike…

READ MORE >>

Welcome to the “Cybersecurity Loop” – Edition #12

Cybersecurity Loop Newsletter #12

Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this month — and what you should be thinking about. 🧨 HOT this month…

READ MORE >>

Uncovering and Eliminating RC4 Weak Ciphers in Active Directory

Eliminate the curse of RC4

Overview Active Directory (AD) environments often harbour legacy cryptographic vulnerabilities that can expose organisations to significant security risks. One of the most persistent and dangerous of these is the continued use of RC4 encryption for Kerberos authentication. This article explores how to identify RC4 usage in your environment, the security implications, and provides a strategic…

READ MORE >>

Highly Malicious MacOS Infostealer

Infostealer Alert

This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…

READ MORE >>