Edwin Kwan
  • Home
  • Speaker
  • Podcasts
    • Cyber Bites
    • AppSec Unlocked
    • It’s 5:05 Podcast
  • Journal
Select Page

Google Confirms Data Breach Exposed 2.55 Million Potential Ads Customer Records in Salesforce Attack

Aug 11, 2025 | Podcast

https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion Google has officially confirmed a data breach affecting one of its Salesforce CRM instances that exposed information belonging to potential Google Ads customers, with threat actors...

Australian Spy Chief Warns Defense Workers’ LinkedIn Profiles Are Exposing Classified Projects to Foreign Intelligence

Aug 8, 2025 | Podcast

https://www.asio.gov.au/26th-annual-hawke-lecture-counting-and-countering-cost-espionage Australia’s top intelligence official has issued a strong warning about the espionage risks posed by social media profiles that reveal sensitive defence work, highlighting...

Cybercriminals Use Raspberry Pi Device to Execute Physical ATM Heist in Indonesian Bank Network

Aug 7, 2025 | Podcast

https://www.group-ib.com/blog/unc2891-bank-heist A sophisticated cybercriminal group successfully executed a physical network intrusion using a Raspberry Pi device to steal cash from an Indonesian ATM, demonstrating a new level of coordination between digital...

Cybercriminals Exploit Security Link-Wrapping Services to Launch Sophisticated Microsoft 365 Phishing Campaigns

Aug 6, 2025 | Podcast

https://www.cloudflare.com/threat-intelligence/research/report/attackers-abusing-proofpoint-intermedia-link-wrapping-to-deliver-phishing-payloads Threat actors have discovered a new method to legitimise phishing attacks by exploiting link-wrapping security features...

Application Security Crisis Deepens as 62% of Organisations Ship Vulnerable Code Under Deadline Pressure

Aug 5, 2025 | Podcast

https://cypressdefense.com/resources/state-of-application-security-report A new report from Cypress Data Defense has revealed a troubling state of application security, with 62% of organisations knowingly deploying vulnerable code to production environments to meet...

Critical Vulnerability in AI-Powered Cursor IDE Enables Remote Code Execution Through Prompt Injection

Aug 4, 2025 | Podcast

https://www.aim.security/lp/aim-labs-curxecute-blogpost Security researchers at Aim Security have discovered a critical vulnerability dubbed CurXecute in the popular AI-powered code editor Cursor, which affects nearly all versions of the IDE and can be exploited to...
« Older Entries
Next Entries »

Latest Posts

  • Cloudflare 1.1.1.1 DNS Certificates Misused, Raising Security Concerns
  • Apple iCloud Calendar Abused for Phishing Scams
  • GhostAction Supply Chain Attack Compromises 817 GitHub Repositories, Steals 3,325 Developer Secrets
  • Massive Chinese ‘Salt Typhoon’ Cyberattack May Have Compromised Data from Nearly Every American
  • Massive NPM Supply Chain Attack Compromises 18 Popular Packages with 2 Billion Weekly Downloads

Speaking Events

  • INFS2701 Guest Lecture at UNSW Business School
  • Speaker at ADAPT Cloud & Infrastructure Edge 2025
  • Speaker at Sysdig Accelerate ’25 APJ Sydney
  • Speaker at EveryOps Day 2025
  • Speaker at AWS Summit Sydney

More Content

  • Articles (26)
  • Podcast (641)
  • Posts (24)
  • Speaking (44)
  • X
  • RSS
Edwin Kwan