Posts by John Reeman
Welcome to the “Cybersecurity Loop” – Edition #13
Now, before we unpack this month’s stories, just a quick note to let you know that we will be on Stand #55 at the ALPMA Summit 2025 in Sydney, 3 – 5 September. This year, for every person who visits our stand and plays our “Data Booster” game, you get a chance to win a…
READ MORE >>Cyooda Featured in the LawyersWeekly Legal Operations Guide 2025
Cyooda Proud to be Featured as the ONLY Cybersecurity Provider in Lawyers Weekly’s Legal Operations Guide 2025. We’re thrilled to announce that Cyooda has been selected as the exclusive cybersecurity provider featured in Lawyers Weekly’s prestigious Legal Operations Guide 2025. This recognition highlights our specialised expertise in protecting law firms from the ever-evolving landscape of…
READ MORE >>Digital Forensics: A Comprehensive Guide to Investigation, Recovery, and Analysis
Digital forensics has become increasingly critical as our world becomes more digitised. From smartphones and laptops to IoT devices and cloud storage, digital evidence can be found everywhere. Understanding digital forensics is essential for law enforcement, corporate security teams, legal professionals, and IT administrators who may need to investigate security incidents or recover lost data.
READ MORE >>The Hidden Deal Breaker: Why Cybersecurity is Critical for M&A Success
Over the last 5 years mergers and acquisitions represent more than just financial transactions. They’re complex integrations of digital ecosystems, data repositories, and cyber risk profiles. While traditional M&A due diligence focuses heavily on financial performance, market position and operational synergies, cybersecurity has emerged as a make-or-break factor that can determine whether a deal creates…
READ MORE >>Metricon homes: Australia’s Largest Home Builder Falls Victim to Qilin Ransomware Attack
Metricon Homes, Australia’s premier residential construction company, has become the latest high-profile victim of the prolific Qilin ransomware group in a significant cyberattack that compromised sensitive corporate data. The Breach: What Happened On July 21, 2025, the Qilin ransomware operation successfully infiltrated the IT systems of Victoria-based Metricon Homes, claiming to have stolen a substantial…
READ MORE >>Token Protection in Microsoft Entra ID: A Game-Changer for Business Email Compromise Defence
As cybersecurity investigators well know, Business Email Compromise (BEC) attacks have evolved far beyond simple phishing schemes. Today’s sophisticated threat actors have mastered the art of token theft and manipulation, allowing them to maintain persistent access to victim systems even after passwords have been changed. This presents a significant challenge for organisations and investigators alike…
READ MORE >>Welcome to the “Cybersecurity Loop” – Edition #12
Every few weeks, I share a quick pulse on what’s happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this month — and what you should be thinking about. 🧨 HOT this month…
READ MORE >>Qilin Ransomware: The Criminal Enterprise Redefining Cyber Extortion
CYBERSECURITY ALERT: When Ransomware Groups Start Offering “Legal Advice”
The Qilin ransomware group has crossed a disturbing new threshold—they’re now providing legal advisory services to their affiliates on how to maximize extortion pressure.
Uncovering and Eliminating RC4 Weak Ciphers in Active Directory
Overview Active Directory (AD) environments often harbour legacy cryptographic vulnerabilities that can expose organisations to significant security risks. One of the most persistent and dangerous of these is the continued use of RC4 encryption for Kerberos authentication. This article explores how to identify RC4 usage in your environment, the security implications, and provides a strategic…
READ MORE >>Highly Malicious MacOS Infostealer
This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…
READ MORE >>