Edwin Kwan
  • Home
  • Speaker
  • Podcasts
    • Cyber Bites
    • AppSec Unlocked
    • It’s 5:05 Podcast
  • Journal
  • Publications
Select Page

Google’s Cloud Threat Horizons Report: Attackers Exploit Cloud Vulnerabilities More Than Weak Credentials

Mar 13, 2026 | Podcast

https://services.google.com/fh/files/misc/cloud_threat_horizons_report_h12026.pdf According to Google’s Cloud Threat Horizons Report, cybercriminals targeting cloud environments have been increasingly exploiting system vulnerabilities in addition to relying on...

Microsoft Teams Phishing Campaign Deploys Backdoors to Target Employees

Mar 12, 2026 | Podcast

https://www.bluevoyant.com/blog/new-a0backdoor-linked-to-teams-impersonation-and-quick-assist-social-engineering A new phishing campaign exploiting Microsoft Teams has come to light, aiming to compromise employees by delivering backdoor malware. Attackers are...

Malicious npm Package Impersonates OpenClaw Installer to Deploy Remote Access Trojan and Harvest macOS Credentials

Mar 11, 2026 | Podcast

https://research.jfrog.com/post/ghostclaw-unmasked Cybersecurity researchers have identified a malicious npm package masquerading as an OpenClaw installer that deploys a remote access trojan and exfiltrates sensitive data from compromised systems. The package, named...

Meta Collaborates with International Law Enforcement to Dismantle Southeast Asian Scam Operations, Disables 150,000 Accounts

Mar 10, 2026 | Podcast

Global Law Enforcement Agencies, With Support From Meta, Disrupt Major Criminal Scam Networks Based in Southeast Asia Meta partnered with international law enforcement agencies in a coordinated operation that resulted in the takedown of over 150,000 accounts...

Researchers Exploit AI Browser Reasoning to Train Self-Optimizing Phishing Scams in Under Four Minutes

Mar 9, 2026 | Podcast

https://guard.io/labs/agenticblabbering—how-ai-browsers-verbose-reasoning-fuels-the-ultimate-scamming-machine Security researchers at Guardio have demonstrated a critical vulnerability in AI-powered autonomous browsers by successfully tricking Perplexity’s...

Iranian Threat Actors Launch Hundreds of Attacks Against IP Surveillance Cameras Across Middle East

Mar 7, 2026 | Podcast

https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east Multiple Iranian hacking groups have conducted hundreds of exploitation attempts against internet-connected surveillance cameras across...

Hacktivist Groups Launch 149 DDoS Attacks Against 110 Organisations Following Middle East Military Operations

Mar 6, 2026 | Podcast

https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion Cybersecurity researchers have documented a dramatic surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military...

ClawJacked Vulnerability Allows Malicious Websites to Hijack Local OpenClaw AI Agents via WebSocket

Mar 5, 2026 | Podcast

https://www.oasis.security/blog/openclaw-vulnerability OpenClaw has patched a high-severity security flaw nicknamed ClawJacked that could allow malicious websites to connect to and commandeer locally running AI agents through a WebSocket attack. The vulnerability,...

Developer Faces $82,000 Bill After Stolen Google Gemini API Key Enables Massive Unauthorised Usage

Mar 4, 2026 | Podcast

https://old.reddit.com/r/googlecloud/comments/1reqtvi/82000_in_48_hours_from_stolen_gemini_api_key_my A small startup is confronting potential bankruptcy after unknown attackers exploited a compromised Google Gemini API key to rack up $82,314 in unauthorised charges...

DJI Romo Robot Vacuums Exposed Thousands of Devices Through Critical Security Flaws

Mar 3, 2026 | Podcast

https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt A Spanish AI strategist accidentally gained unauthorized access to approximately 7,000 DJI Romo robot vacuums worldwide after attempting to create a custom remote...
« Older Entries

Latest Posts

  • Google’s Cloud Threat Horizons Report: Attackers Exploit Cloud Vulnerabilities More Than Weak Credentials
  • Microsoft Teams Phishing Campaign Deploys Backdoors to Target Employees
  • Malicious npm Package Impersonates OpenClaw Installer to Deploy Remote Access Trojan and Harvest macOS Credentials
  • Meta Collaborates with International Law Enforcement to Dismantle Southeast Asian Scam Operations, Disables 150,000 Accounts
  • Researchers Exploit AI Browser Reasoning to Train Self-Optimizing Phishing Scams in Under Four Minutes

Speaking Events

  • Panelist at SecTalks Legends – 2025
  • Keynote Speaker at Sydney AI Security Summit 2025
  • Speaker at The Artificial Unintelligence Conference
  • INFS2701 Guest Lecture at UNSW Business School
  • Speaker at ADAPT Cloud & Infrastructure Edge 2025

More Content

  • Articles (26)
  • Podcast (757)
  • Posts (26)
  • Publications (1)
  • Speaking (47)
  • X
  • RSS
Edwin Kwan