Home Blog

Group-IB “Ransomware Uncovered 2020 – 2021” Report Published

Group-IB Ransomware Report
Cyber security company Group-IB have recently published a eye opening report on ransomware - revealing that almost two-thirds of ransomware attacks analysed during 2020 came from cyber criminals operating on a RaaS model. The report is well worth a read, and provides insightful details on how gangs operate and info to help cyber defence teams thwart attacks. It also...

Apple and Google Partner Up to Offer Covid-19 Contact Tracing

Apple Google Partnership for contact tracing

#StaySmartOnlineWeek – Steps to lock down your online security

In the spirit of #staysmartonline week which runs from Monday the 7th to the 13th of October 2019, I thought I’d share some handy cyber tips to help lock down your online security. By sharing this information, I want to ensure everyone can proactively protect themselves from cyber-crime, and the most common threats online. It's not hard to do - just...

OAIC releases Notifiable Data Breaches Quarterly Statistics Report & 12-month Insights Report

OAIC Notifiable Data Breaches Scheme 12 month insights report
Today, the Office of the Australian Information Commissioner #OAIC released their Notifiable Data Breaches Quarterly Statistics Report for the 1st January 2019 through to the 31st March 2019, as well as their 12-month insights report. Here's a quick summary of the insights released: There were 964 data breach notifications from the 1st of April through to the 31st of March. There's been...

CISA issues emergency directive following Microsoft Exchange zero-day vulnerability fixes

Microsoft Exchange Fix
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive following the release of fixes for zero-day vulnerabilities in Microsoft Exchange.  On 2 March 2021, Microsoft released emergency security updates to fix four security holes in Exchange Server versions 2013 through 2019 that hackers were actively using to siphon email communications from Internet-facing systems running Microsoft Exchange. In...

Cyber Careers Advice

I've hired a number of grads in my career, plus placed various contractors and perms, - so I often have various scenarios where people pick my brain for advice on how best to get into cyber security. I therefore figured it would be best to write up some of my views and advice here, so more people who want to...

Top 10 proactive steps to protect yourself from identity takeovers & fraud

When I tell people I meet outside of work what I do for a living, the conversation often evolves into questions about practical steps I recommend in order to protect against identity takeovers and fraud. Unfortunately I sometimes also meet people who have become victims of fraud, and wished they had known what to do in advance, hence why I...

Inspiring cyber / privacy books, podcasts, documentaries and websites

cyber security privacy books podcasts sites
I often get asked by friends and colleagues for recommendations on latest info to read / listen to for all things cyber & privacy, or interesting & inspiring material to read up on. I therefore decided it would be useful to share this more broadly, hence this page. Here's my latest recommendations: "Darknet Diaries" Podcast by Jack Rhysider. A mix of...

SolarWinds global hack – so what happened?


Online trolls to face massive fines in world-first Australian cyber laws


Luscious LinkedIn Profiles – Please connect with me!?

Have you ever received a LinkedIn invitation from someone you don't actually know, but accepted it anyway because the profile photo looked 'interesting' or 'attractive'? It's one of the oldest tricks in the book used to connect with you and your contacts... would you be upset if I told you that it's just a social engineering trick? There are all...

5 cyber tips – for individuals & businesses alike

I often get asked my opinion on what small businesses and individuals can do to protect themselves against cyber attackers.  This is the list that I always come back to... So let’s reveal 5 important things you can do to make yourself much more secure both at home, as well as whilst at work, and beat the bad hackers, crackers...

Crying Baby Social Engineering

This is a great example of how human manipulation can easily trick someone into doing something they shouldn't. A crying baby and convincing friendly female voice is sure to get someone doing something they shouldn't. This video brings this technique to life!