Israel-Hamas War Crypto Donation Scams

Since the Israel-Hamas War, there’s been numerous crypto donation scam site appearing online. Scammers have been capitalising on the horrific events of the Israel-Hamas conflict by pretending to be legitimate charities and collecting donations. These websites...

OAuth Implementation Flaw Allowing Account Takeover

Hundreds of millions of users accounts that use cross-platform authentication were at risk of having their accounts taken over by threat actors. Security researchers had discovered critical misconfiguration flaws in the implementation of the Open Authorization (OAuth)...

1Password Impacted by Okta Breach

1Password has confirmed that it was attacked by cyber criminals using session information that was stolen in the recent Okta breach. 1Password is a popular password management platform used by over 100,000 businesses. A member of their IT team detected suspicious...
All Day DevOps (ADDO) 2023

All Day DevOps (ADDO) 2023

This year’s All Day DevOps event saw 180 speakers presenting across 6 tracks for the 24hr conference. The tracks were: CI/CD Continuous Everything Modern Infrastructure DevSecOps Cultural Transformations Site Reliability Engineering Software Supply Chain Viewers...

South Australian Superannuation Suffers Breach

Super SA, a dedicated superannuation fund for state government employees in South Australia had suffered a data breach. Over 14,000 members were impacted by the breach and the compromised data included name, address and date of birth. The data loss was through a...

Okta Breach Exposed Sensitive Customer Data

Okta recently announced that their support case management system had suffered a breach and sensitive customer data were stolen. Okta provides identity tools such as multi-factor authentication and single sign-on to their customers. They said that the incident...

Fake Browser Updates Delivering Malware

Attackers are using cybersecurity best practices against users, prompting them to download malicious browser updates. Security researchers are observing a growing trend where attackers are disguising their malware as fake browser updates. The attackers would start by...

Top Password Used By IT Admins is admin

The password admin has been found to be the top password used by IT administrators. Security researchers have discovered that IT administrators are using weak passwords to protect access to portals, providing easy access to attackers to enterprise networks. An...

Malicious Red Alert App Spying on Israelis

Malicious version of the Israeli incoming airstrike warning app have been found distributed over internet. Red Alert is a legitimate app used by Israeli citizens to receive notifications of incoming rocket attacks. The app’s popularity has soared since the...