CommuniCloud Cyber Security September Wrap-up.

Why You Should Stay Updated on What's New in Cybersecurity

The digital landscape is evolving faster than ever, and with it comes a constant wave of cybersecurity threats and solutions. For businesses, IT professionals, and everyday users, staying updated with what’s new in cybersecurity isn’t optional, it’s essential.
Each month brings fresh challenges and developments. Whether it’s a new malware strain, the rise of ransomware-as-a-service, or groundbreaking solutions in network security insights, understanding these changes can be the difference between protection and vulnerability.
This monthly cybersecurity wrap-up offers a digestible and expert summary of the most impactful developments, supported with actionable insights to keep you and your organisation ahead of the curve.

The stories, in brief

Optus Triple Zero outage traced to firewall change

A routine firewall upgrade caused a thirteen hour failure of emergency calls, with delayed escalation and multiple investigations now in motion. Validate your own emergency failover and change control.
iTnews

Government heat on Optus response

Following the outage, senior ministers signalled tougher oversight and scrutiny of incident communications and accountability. Expect rising regulatory focus on telco grade resilience. iTnews

ImageResizer.ashx?n=https%3a%2f%2fi.nextmedia.com.au%2fNews%2foptus-stores-1.jpg&h=420&w=748&c=0&s=0
Cyber%20Security%2FACSC-logo-csc_ixoljt

ACSC warns of code repository targeting

Attackers harvest secrets, pivot into private repos, and poison supply chains. Enforce secrets scanning, signed commits, and package monitoring across all pipelines.
Cyber Daily

NSW third party incidents quadruple

Government linked cyber incidents tied to external providers surged over two years, highlighting supplier exposure and integration blind spots. Tighten vendor tiers and telemetry requirements. Cyber Daily

Cyber%20Daily%2FNSW-parliament-house-csc_bcu9z4
1756439696813?e=2147483647&v=beta&t=7tDE1HIYgiRxmrppNfMrMjoNvGrKx8h82WquZjI5ftE

Passkeys Pwned is an implementation wake up

DEF CON researchers showed how proxied flows and browser risks can hijack passkey enrollment and sign in. Harden workflows, restrict risky extensions, and add step up checks. SquareX Labs

UNSW scales governed AI with ChatGPT Edu

Ten thousand licences aim to enable secure AI in teaching and research. For enterprises, this mirrors the need for governed instances with DLP and logging. Cyber Daily

UNSW_students_qcnjc8
TAG_cards_6-7A1.width-1300.jpg

Google updates its AI safety framework

The revised framework adds protections for manipulation and expands safety case reviews. Map AI projects to capability and risk levels before rollout. iTnews

October’s theme is dependency risk. Network changes, repos, suppliers, browsers, and AI platforms are all leverage points for attackers and regulators. If you only do one thing, pick the riskiest dependency in your stack and wire it fully into your SOC with controls, tests, and telemetry. For deeper guidance and links to each full story, head to our site.

More from this months newsletter >

October Cyber News Wrap-Up: Australia’s Big Stories

31 October 2025

October Cyber News Wrap-Up October was a high-tempo month for Australian cyber news: big-brand breaches, […]

Read More

Continuous Vulnerability Scanning for Real Risk

30 October 2025

Scheduled Vs Continuous Vulnerability Scanning Why the old model is leaving gaps you cannot ignore […]

Read More

How to Maximise ROI from Your 2026 Cyber Security Budget

30 October 2025

Cybersecurity budgets are rising in 2026, but smart allocation is what drives real ROI. Here’s […]

Read More

Hackers Exploit Microsoft Teams Access Tokens to Steal Chats and Emails

30 October 2025

Hackers are exploiting Microsoft Teams access tokens to infiltrate chats, emails, and documents here’s what […]

Read More