Highly Malicious MacOS Infostealer

Infostealer Alert

This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…

Read More

Top Australian Cybersecurity Blog

Top Australian Cyber Security Blog 2025

๐Ÿ† ๐–๐žโ€™๐ฏ๐ž ๐›๐ž๐ž๐ง ๐ซ๐ž๐œ๐จ๐ ๐ง๐ข๐ฌ๐ž๐! ๐Ÿ† Cyooda Security has been named one of the ๐“๐จ๐ฉ ๐Ÿ”Ÿ ๐€๐ฎ๐ฌ๐ญ๐ซ๐š๐ฅ๐ข๐š๐ง ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฅ๐จ๐ ๐ฌ by ๐…๐„๐„๐ƒ๐’๐๐Ž๐“! This recognition reflects our commitment to helping law firms across Australia and the Asia-Pacific stay ahead of cyber threats with practical, relevant, and trusted insights. A huge thank you to our clients, community, and…

Read More

Cyber Crisis Simulations for Law Firms: Are You Ready?

72-hour Cyber Crisis Response Kit

Are You Ready for the Next Cyber Attack? When a cyber breach hits your firm, the first 72 hours will define your future. Panic, silence, or poor decisions can do more damage than the attackers themselves. Thatโ€™s where cyber crisis simulations step inโ€”not as a checkbox exercise, but as a mission-critical rehearsal that can make…

Read More

The Ultimate Guide to becoming a CISO

The journey to become a CISO

The Journey to becoming a Chief Information Security Officer (CISO) As cybersecurity threats grow more complex and pervasive, the role of the Chief Information Security Officer (CISO) has become a cornerstone of most enterprise organisations. For aspiring cybersecurity professionals, reaching the CISO level represents both a significant challenge and a rewarding culmination of their career.ย …

Read More

The ultimate Top 100 Cyber Security Blogs in the World

Top 100 CyberSecurity Blogs

This comprehensive list represents the most influential and widely-followed cybersecurity websites, blogs, and resources globally, compiled from multiple industry rankings and expert recommendations. Tier 1: Elite Cybersecurity News & Information Sources (1-25) The Hacker News – Leading cybersecurity news platform with 4.5+ million followers KrebsOnSecurity – Brian Krebs’ investigative cybersecurity journalism Dark Reading – Trusted…

Read More

Demystifying an IRAP Assessment: Everything You Need to Know

IRAP Assessment

Is your law firm looking to understand the ins and outs of an IRAP assessment? Look no further! In this comprehensive guide, we will demystify the IRAP assessment and provide you with everything you need to know. The IRAP assessment, or Information Security Registered Assessors Program, is a crucial step in ensuring the security and…

Read More

Unlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy

Crafting an AI Policy

In the rapidly evolving landscape of artificial intelligence (AI), crafting a powerful AI policy is essential for unlocking its potential while ensuring ethical and responsible use. With the technology becoming more widely adopted in various industries, organizations face the challenge of balancing innovation and accountability. In this ultimate guide, we will explore the key principles…

Read More

Attackers only have to get it right once: Defenders 100% of the time!

Defenders have to get it right 100% of the time: Attackers only Once

๐€๐ญ๐ญ๐š๐œ๐ค๐ž๐ซ๐ฌ ๐จ๐ง๐ฅ๐ฒ ๐ก๐š๐ฏ๐ž ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ญ ๐ซ๐ข๐ ๐ก๐ญ ๐จ๐ง๐œ๐ž, ๐๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ๐ฌ ๐ก๐š๐ฏ๐ž ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ญ ๐ซ๐ข๐ ๐ก๐ญ 100% ๐จ๐Ÿ ๐ญ๐ก๐ž ๐ญ๐ข๐ฆ๐ž! Do defenders really have to get it right 100% of the time though? ๐Ÿค” Iโ€™ve heard this phrase so often over the last decade and sometimes by people who should know better, ๐ข๐ญโ€™๐ฌ ๐ญ๐ข๐ฆ๐ž ๐ญ๐จ ๐œ๐š๐ฅ๐ฅ ๐๐’…

Read More

Rapid Cyber Incident Response: The Critical Role of Speed, Quality, and Tooling

Digital Forensics and Incident Response (DFIR)

Cyberattacks, ranging from ransomware, data breaches, business email compromise to advanced persistent threats (APTs), can strike at any moment, potentially causing significant damage. So having rapid and effective incident response is essential to minimise the impact of cyberattacks and to protect an organisation’s sensitive data, reputation, and business continuity. For organisations of any size, the…

Read More

Unlocking the Secrets of Cloud Digital Forensics | M365

Digital Forensics in the Cloud for M365, Azure, AWS and GCP

Welcome to the world of cloud forensics, where investigations in cloud environments like AWS, Azure, GCP, and M365 require unique expertise and tools. As organisations increasingly rely on these platforms for their business operations, the need for effective cloud forensics becomes paramount. In this article, we will unveil the intricacies of cloud forensics and explore…

Read More