May 21, 2025 | Podcast
https://humanrights.gov.au/our-work/commission-general/data-breach-notification In a significant data security incident, the Australian Human Rights Commission (AHRC) has inadvertently exposed sensitive internal documents to search engines, making confidential...
May 20, 2025 | Podcast
https://www.verizon.com/business/resources/reports/dbir Verizon’s 2025 Data Breach Investigations Report (DBIR) paints a concerning picture of today’s cybersecurity landscape, with third-party involvement in breaches doubling to 30% and vulnerability...
May 19, 2025 | Podcast
https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-july-to-december-2024 The Australian healthcare sector has emerged as the leading source of notifiable data breaches in the second half of...
May 17, 2025 | Podcast
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Cybersecurity researchers have uncovered two threat actor groups, codenamed Reckless Rabbit and Ruthless Rabbit, orchestrating elaborate investment scams through fake celebrity endorsements and...
May 16, 2025 | Podcast
https://blog.google/technology/safety-security/how-were-using-ai-to-combat-the-latest-scams Google has unveiled a new suite of artificial intelligence-powered security features designed to protect users from evolving online scams across its Chrome browser, Search...
May 15, 2025 | Podcast
https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms Cybersecurity researchers have discovered a sophisticated malware campaign using fake artificial intelligence tools to distribute an information-stealing malware called...
May 14, 2025 | Podcast
https://socket.dev/blog/malicious-npm-packages-hijack-cursor-editor-on-macos Security researchers have uncovered a sophisticated attack targeting users of Cursor, a popular AI-powered code editor for macOS. Three malicious npm packages, which remain available for...
May 13, 2025 | Podcast
Welcome to AppSec Unlocked. In this article, we’re diving deep into Secure Development Lifecycle training. We’re going to explore how to build security into every phase of your development process—from initial planning through deployment and beyond. Let me...
May 12, 2025 | Podcast
https://plc.pearson.com/en-GB/news-and-insights/news/cyber-security-incidenthttps://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/ Education publishing powerhouse Pearson has confirmed a significant...
May 9, 2025 | Podcast
https://www.theguardian.com/environment/2025/apr/29/source-of-data-are-electric-cars-vulnerable-to-cyber-spies-and-hackers Cybersecurity experts are raising alarms about the potential for electric vehicles to be exploited as surveillance tools, particularly those...