

Apple Disables iCloud End-to-End Encryption in UK Following Government Demand
https://www.bloomberg.com/news/articles/2025-02-21/apple-removes-end-to-end-encryption-feature-from-uk-after-backdoor-order Apple has removed its Advanced Data Protection (ADP) feature, which provides end-to-end encryption for iCloud data, for new users in the United...PayPal “New Address” Feature Abused in Widespread Phishing Scam
https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails A widespread phishing scam is exploiting PayPal’s “new address” feature to send fraudulent purchase notifications to users, tricking them...Australia Bans Kaspersky Products on Government Systems Over Security Concerns
https://www.protectivesecurity.gov.au/system/files/2025-02/PSPF-Direction-002-2025.pdf The Australian government has banned all Kaspersky Lab products and web services from its systems, citing an “unacceptable security risk” due to potential foreign...
Panelist Speaker at The Application Strategy Summit
Yesterday I had the privilege of participating in a panel at the Application Strategy Summit and discussed with fellow panelist Graham Bucknell and Jason Ford on modernising app security to meet the complex demands of today’s application ecosystem and...Australian Fertility Services Giant Genea Suffers Data Breach
https://www.genea.com.au/pages/important-update-about-a-cyber-incident-MCI2XUN2KJWRFXNMZI2ZZ3QVD2JA Genea, a major Australian fertility services provider, has confirmed a security breach after detecting unauthorized access to its network. The company is currently...
Cyber Security Week – Lunchbox Session
My setup for today’s session where I had the opportunity to speak about software supply management maturity at an organisation’s lunchbox session as part of their cyber security week. I love that companies are starting to take their software supply chain...Russian Threat Actors Target Signal Messenger Accounts
https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger Google’s Threat Intelligence Group (GTIG) has observed a surge in efforts by multiple Russian state-aligned threat actors to compromise Signal Messenger accounts,...
Chinese Cybercriminals Revive Carding with Mobile Wallet Attacks
https://krebsonsecurity.com/2025/02/how-phished-data-turns-into-apple-google-wallets Chinese cybercriminal groups have revitalized the carding industry by turning phished credit card data into mobile wallets, enabling widespread fraud. These groups utilize...