Category:

Security Insights

Tokens and business email compromise

Token Protection in Microsoft Entra ID: A Game-Changer for Business Email Compromise Defence

By John Reeman / July 28, 2025

As cybersecurity investigators well know, Business Email Compromise (BEC) attacks have evolved far beyond simple phishing schemes. Today’s sophisticated threat actors have mastered the art of token theft and manipulation, allowing them to maintain persistent access to victim systems even after passwords have been changed. This presents a significant challenge for organisations and investigators alike…

Read More
Eliminate the curse of RC4

Uncovering and Eliminating RC4 Weak Ciphers in Active Directory

By John Reeman / July 23, 2025

Overview Active Directory (AD) environments often harbour legacy cryptographic vulnerabilities that can expose organisations to significant security risks. One of the most persistent and dangerous of these is the continued use of RC4 encryption for Kerberos authentication. This article explores how to identify RC4 usage in your environment, the security implications, and provides a strategic…

Read More
Infostealer Alert

Highly Malicious MacOS Infostealer

By John Reeman / June 18, 2025

This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…

Read More
Top Australian Cyber Security Blog 2025

Top Australian Cybersecurity Blog

By John Reeman / June 13, 2025

🏆 𝐖𝐞’𝐯𝐞 𝐛𝐞𝐞𝐧 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞𝐝! 🏆 Cyooda Security has been named one of the 𝐓𝐨𝐩 🔟 𝐀𝐮𝐬𝐭𝐫𝐚𝐥𝐢𝐚𝐧 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐁𝐥𝐨𝐠𝐬 by 𝐅𝐄𝐄𝐃𝐒𝐏𝐎𝐓! This recognition reflects our commitment to helping law firms across Australia and the Asia-Pacific stay ahead of cyber threats with practical, relevant, and trusted insights. A huge thank you to our clients, community, and…

Read More
72-hour Cyber Crisis Response Kit

Cyber Crisis Simulations for Law Firms: Are You Ready?

By John Reeman / June 6, 2025

Are You Ready for the Next Cyber Attack? When a cyber breach hits your firm, the first 72 hours will define your future. Panic, silence, or poor decisions can do more damage than the attackers themselves. That’s where cyber crisis simulations step in-not as a checkbox exercise, but as a mission-critical rehearsal that can make…

Read More
The journey to become a CISO

The Ultimate Guide to becoming a CISO

By John Reeman / May 14, 2025

The Journey to becoming a Chief Information Security Officer (CISO) As cybersecurity threats grow more complex and pervasive, the role of the Chief Information Security Officer (CISO) has become a cornerstone of most enterprise organisations. For aspiring cybersecurity professionals, reaching the CISO level represents both a significant challenge and a rewarding culmination of their career. …

Read More
Top 100 CyberSecurity Blogs

The ultimate Top 100 Cyber Security Blogs in the World

By John Reeman / April 8, 2025

This comprehensive list represents the most influential and widely-followed cybersecurity websites, blogs, and resources globally, compiled from multiple industry rankings and expert recommendations. Tier 1: Elite Cybersecurity News & Information Sources (1-25) The Hacker News – Leading cybersecurity news platform with 4.5+ million followers KrebsOnSecurity – Brian Krebs’ investigative cybersecurity journalism Dark Reading – Trusted…

Read More
IRAP Assessment

Demystifying an IRAP Assessment: Everything You Need to Know

By John Reeman / March 4, 2025

Is your law firm looking to understand the ins and outs of an IRAP assessment? Look no further! In this comprehensive guide, we will demystify the IRAP assessment and provide you with everything you need to know. The IRAP assessment, or Information Security Registered Assessors Program, is a crucial step in ensuring the security and…

Read More
Crafting an AI Policy

Unlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy

By John Reeman / January 30, 2025

In the rapidly evolving landscape of artificial intelligence (AI), crafting a powerful AI policy is essential for unlocking its potential while ensuring ethical and responsible use. With the technology becoming more widely adopted in various industries, organizations face the challenge of balancing innovation and accountability. In this ultimate guide, we will explore the key principles…

Read More
Defenders have to get it right 100% of the time: Attackers only Once

Attackers only have to get it right once: Defenders 100% of the time!

By John Reeman / December 11, 2024

𝐀𝐭𝐭𝐚𝐜𝐤𝐞𝐫𝐬 𝐨𝐧𝐥𝐲 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 𝐨𝐧𝐜𝐞, 𝐝𝐞𝐟𝐞𝐧𝐝𝐞𝐫𝐬 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 100% 𝐨𝐟 𝐭𝐡𝐞 𝐭𝐢𝐦𝐞! Do defenders really have to get it right 100% of the time though? 🤔 I’ve heard this phrase so often over the last decade and sometimes by people who should know better, 𝐢𝐭’𝐬 𝐭𝐢𝐦𝐞 𝐭𝐨 𝐜𝐚𝐥𝐥 𝐁𝐒…

Read More