Cyooda Security
Highly Malicious MacOS Infostealer
This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…
Read MoreTop Australian Cybersecurity Blog
๐ ๐๐โ๐ฏ๐ ๐๐๐๐ง ๐ซ๐๐๐จ๐ ๐ง๐ข๐ฌ๐๐! ๐ Cyooda Security has been named one of the ๐๐จ๐ฉ ๐ ๐๐ฎ๐ฌ๐ญ๐ซ๐๐ฅ๐ข๐๐ง ๐๐ฒ๐๐๐ซ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฅ๐จ๐ ๐ฌ by ๐ ๐๐๐๐๐๐๐! This recognition reflects our commitment to helping law firms across Australia and the Asia-Pacific stay ahead of cyber threats with practical, relevant, and trusted insights. A huge thank you to our clients, community, and…
Read MoreCyber Crisis Simulations for Law Firms: Are You Ready?
Are You Ready for the Next Cyber Attack? When a cyber breach hits your firm, the first 72 hours will define your future. Panic, silence, or poor decisions can do more damage than the attackers themselves. Thatโs where cyber crisis simulations step inโnot as a checkbox exercise, but as a mission-critical rehearsal that can make…
Read MoreThe Ultimate Guide to becoming a CISO
The Journey to becoming a Chief Information Security Officer (CISO) As cybersecurity threats grow more complex and pervasive, the role of the Chief Information Security Officer (CISO) has become a cornerstone of most enterprise organisations. For aspiring cybersecurity professionals, reaching the CISO level represents both a significant challenge and a rewarding culmination of their career.ย …
Read MoreThe ultimate Top 100 Cyber Security Blogs in the World
This comprehensive list represents the most influential and widely-followed cybersecurity websites, blogs, and resources globally, compiled from multiple industry rankings and expert recommendations. Tier 1: Elite Cybersecurity News & Information Sources (1-25) The Hacker News – Leading cybersecurity news platform with 4.5+ million followers KrebsOnSecurity – Brian Krebs’ investigative cybersecurity journalism Dark Reading – Trusted…
Read MoreDemystifying an IRAP Assessment: Everything You Need to Know
Is your law firm looking to understand the ins and outs of an IRAP assessment? Look no further! In this comprehensive guide, we will demystify the IRAP assessment and provide you with everything you need to know. The IRAP assessment, or Information Security Registered Assessors Program, is a crucial step in ensuring the security and…
Read MoreUnlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy
In the rapidly evolving landscape of artificial intelligence (AI), crafting a powerful AI policy is essential for unlocking its potential while ensuring ethical and responsible use. With the technology becoming more widely adopted in various industries, organizations face the challenge of balancing innovation and accountability. In this ultimate guide, we will explore the key principles…
Read MoreAttackers only have to get it right once: Defenders 100% of the time!
๐๐ญ๐ญ๐๐๐ค๐๐ซ๐ฌ ๐จ๐ง๐ฅ๐ฒ ๐ก๐๐ฏ๐ ๐ญ๐จ ๐ ๐๐ญ ๐ข๐ญ ๐ซ๐ข๐ ๐ก๐ญ ๐จ๐ง๐๐, ๐๐๐๐๐ง๐๐๐ซ๐ฌ ๐ก๐๐ฏ๐ ๐ญ๐จ ๐ ๐๐ญ ๐ข๐ญ ๐ซ๐ข๐ ๐ก๐ญ 100% ๐จ๐ ๐ญ๐ก๐ ๐ญ๐ข๐ฆ๐! Do defenders really have to get it right 100% of the time though? ๐ค Iโve heard this phrase so often over the last decade and sometimes by people who should know better, ๐ข๐ญโ๐ฌ ๐ญ๐ข๐ฆ๐ ๐ญ๐จ ๐๐๐ฅ๐ฅ ๐๐…
Read MoreRapid Cyber Incident Response: The Critical Role of Speed, Quality, and Tooling
Cyberattacks, ranging from ransomware, data breaches, business email compromise to advanced persistent threats (APTs), can strike at any moment, potentially causing significant damage. So having rapid and effective incident response is essential to minimise the impact of cyberattacks and to protect an organisation’s sensitive data, reputation, and business continuity. For organisations of any size, the…
Read MoreUnlocking the Secrets of Cloud Digital Forensics | M365
Welcome to the world of cloud forensics, where investigations in cloud environments like AWS, Azure, GCP, and M365 require unique expertise and tools. As organisations increasingly rely on these platforms for their business operations, the need for effective cloud forensics becomes paramount. In this article, we will unveil the intricacies of cloud forensics and explore…
Read More