Edwin Kwan
  • Home
  • Speaker
  • Podcasts
    • Cyber Bites
    • AppSec Unlocked
    • It’s 5:05 Podcast
  • Journal
  • Publications
Select Page

Australian Spy Chief Warns Defense Workers’ LinkedIn Profiles Are Exposing Classified Projects to Foreign Intelligence

Aug 8, 2025 | Podcast

https://www.asio.gov.au/26th-annual-hawke-lecture-counting-and-countering-cost-espionage Australia’s top intelligence official has issued a strong warning about the espionage risks posed by social media profiles that reveal sensitive defence work, highlighting...

Cybercriminals Use Raspberry Pi Device to Execute Physical ATM Heist in Indonesian Bank Network

Aug 7, 2025 | Podcast

https://www.group-ib.com/blog/unc2891-bank-heist A sophisticated cybercriminal group successfully executed a physical network intrusion using a Raspberry Pi device to steal cash from an Indonesian ATM, demonstrating a new level of coordination between digital...

Cybercriminals Exploit Security Link-Wrapping Services to Launch Sophisticated Microsoft 365 Phishing Campaigns

Aug 6, 2025 | Podcast

https://www.cloudflare.com/threat-intelligence/research/report/attackers-abusing-proofpoint-intermedia-link-wrapping-to-deliver-phishing-payloads Threat actors have discovered a new method to legitimise phishing attacks by exploiting link-wrapping security features...

Application Security Crisis Deepens as 62% of Organisations Ship Vulnerable Code Under Deadline Pressure

Aug 5, 2025 | Podcast

https://cypressdefense.com/resources/state-of-application-security-report A new report from Cypress Data Defense has revealed a troubling state of application security, with 62% of organisations knowingly deploying vulnerable code to production environments to meet...

Critical Vulnerability in AI-Powered Cursor IDE Enables Remote Code Execution Through Prompt Injection

Aug 4, 2025 | Podcast

https://www.aim.security/lp/aim-labs-curxecute-blogpost Security researchers at Aim Security have discovered a critical vulnerability dubbed CurXecute in the popular AI-powered code editor Cursor, which affects nearly all versions of the IDE and can be exploited to...

Security Teams Overwhelmed by Threat Intelligence Data Deluge, Study Reveals Growing Cybersecurity Vulnerability

Aug 1, 2025 | Podcast

https://cloud.google.com/blog/products/identity-security/too-many-threats-too-much-data-new-survey-heres-how-to-fix-that A new study commissioned by Google Cloud has revealed that security professionals are drowning in threat intelligence data, with 61 percent of...
« Older Entries
Next Entries »

Latest Posts

  • Microsoft Patches Remote Code Execution Flaw in Windows 11 Notepad
  • Fake 7-Zip Site Distributes Trojanised Installer Creating Residential Proxy Network
  • Service NSW Launches Pilot for New Digital Identity Verification System
  • Australian Government Agencies Falling Short on Cyber Incident Reporting, Undermining National Security
  • Apple Patches Critical Zero-Day Vulnerability Exploited in Targeted Attacks

Speaking Events

  • Panelist at SecTalks Legends – 2025
  • Keynote Speaker at Sydney AI Security Summit 2025
  • Speaker at The Artificial Unintelligence Conference
  • INFS2701 Guest Lecture at UNSW Business School
  • Speaker at ADAPT Cloud & Infrastructure Edge 2025

More Content

  • Articles (26)
  • Podcast (736)
  • Posts (26)
  • Publications (1)
  • Speaking (47)
  • X
  • RSS
Edwin Kwan