Australian Cyber Crime Reporting Resource

The Australian Cyber Security Centre (ACSC) is urging all Australian to report Cybercrimes using their easy online service. The reporting can be done anonymously and reports by individuals will be referred directly to the relevant state or territory law enforcement...

Google Cloud Build Vulnerable to Supply Chain Attacks

Security Researchers have discovered a design flaw in Google Cloud Build which can allow for supply chain attacks. Google Cloud Build is Google Cloud’s managed continuous integration and delivery service. This CI/CD service allows users to automate the process...

Thousands of Container Images Leaking Secrets

Researchers from a German university recently published a paper revealing that tens of thousands of container images hosted on Docker Hub contain confidential secrets. Docker Hub is an online repository for docker container images. And a docker container image is a...

What’s Your Social Media OpSec?

Sharing on social media is a good way to keep in touch with friends, but sometimes that can get you in trouble. A Russian Naval officer was recently killed near his home and it was believed that he may have been tracked on the Strava App. Strava is a social fitness...

Spike in Attacks Using Infected USB Drives

Do using USB drivers as an initial infection vector still work today? Well, what is old is new again and security researchers at Mandiant have observed a threefold increase in the number of attacks using infected USB drives to steal secrets. The increase is attributed...

Account Takeovers using Evil QR

Logging in via QR code is something that more websites are starting to embrace. Some of those websites include Discord, Telegram, Whatsapp, Steam and Tiktok. Rather than having to enter a username/password in the website, you use the application’s mobile app to...