Critical PHP Vulnerability Under Mass Exploitation Worldwide

https://www.bleepingcomputer.com/news/security/critical-php-rce-vulnerability-mass-exploited-in-new-attacks A critical PHP remote code execution vulnerability, CVE-2024-4577, is being actively exploited in widespread attacks targeting Windows systems globally. The...

Google Introduces AI Scam Detection for Android

https://security.googleblog.com/2025/03/new-ai-powered-scam-detection-features.html Google has launched AI-powered scam detection features for Android devices, designed to protect users from conversational fraud. These features target scams that start innocently but...

Code Security Remains Crucial, Even in Hardened Environments

https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments A recent study demonstrates that even in hardened environments with read-only file systems, attackers can exploit file write vulnerabilities in Node.js applications to achieve...

Malicious PyPi Package Pirating Deezer Music for Years

https://socket.dev/blog/malicious-pypi-package-exploits-deezer-api-for-coordinated-music-piracy A PyPi package named ‘automslc,’ downloaded over 100,000 times since 2019, has been pirating music from the Deezer streaming service using hardcoded...
Security Culture by Design

Security Culture by Design

Let’s tackle something more fundamental: how to build security into your organization’s DNA. We’re talking about creating a security culture by design. Because here’s the truth – you can have the best tools, the strongest policies, and the most...

Disney Engineer’s Life Destroyed by Malicious AI Download

https://www.wsj.com/tech/cybersecurity/disney-employee-ai-tool-hacker-cyberattack-3700c931 A former Disney engineer, Matthew Van Andel, had his life turned upside down after downloading a seemingly harmless AI tool from GitHub. The software, intended for creating AI...
Inspiring the Next Generation of Cyber Security Professionals

Inspiring the Next Generation of Cyber Security Professionals

I just finished a guest lecture at UNSW for a second-year subject. It was fantastic to engage with such curious students, many of whom were eager to learn about the realities of working in cyber security. I hope I’ve inspired some of the next batch of cyber security...