Monthly Cyber News Wrap Up

CommuniCloud Cyber Security September Wrap-up. Why You Should Stay Updated on What’s New in Cybersecurity The digital landscape is evolving faster than ever, and with it comes a constant wave of cybersecurity threats and solutions. For businesses, IT professionals, and everyday users, staying updated with what’s new in cybersecurity isn’t optional, it’s essential. Each month […]

Monthly Cyber News Wrap Up Read More »

Agentic AI Risks in Autonomous Agent Interaction

Agentic AI Risks in Autonomous Agent Interaction Picture a future where AI agents do more than execute tasks. They negotiate with each other, re-prioritise workloads, and even trigger system-wide changes without human sign-off. This future is no longer science fiction. The rise of agentic AI systems technologies that can set goals, plan strategies, and collaborate

Agentic AI Risks in Autonomous Agent Interaction Read More »

Safe Use of AI in the Workplace

Safe Use of AI in the Workplace What if your team’s next productivity boost also carried hidden risks? As Australian organisations increasingly adopt generative AI tools, the safe use of AI in the workplace is no longer optional, it’s imperative. Missteps with large language models (LLMs) can lead to data exposure, compliance breaches, and reputational

Safe Use of AI in the Workplace Read More »

Safe use of AI in the workplace: secure business-AI collaboration

Encrypted Data Collection for Chatbots with CommuniCloud & SendSafely

GETTING STARTED WITH SECURE AI – ENCRYPTED DATA COLLECTION FOR CHATBOTS Imagine a prospective customer chatting with your support bot, needing to upload identity documents or financial statements. If that upload passes through unprotected chat logs, it becomes a glaring vulnerability. What if the chatbot itself never sees the document but still orchestrates the secure

Encrypted Data Collection for Chatbots with CommuniCloud & SendSafely Read More »

Encrypted chatbot data collection

Celebrating Netpoleon Channel V8 Xperience with Abnormal Security

Celebrating Netpoleon Channel V8 Xperience with Abnormal Security This month, we had the privilege of attending the Netpoleon Channel V8 Xperience and it was an event we will not forget. From start to finish, the energy, the people, and the insights made it truly special. We were excited to see Abnormal AI in action, showing

Celebrating Netpoleon Channel V8 Xperience with Abnormal Security Read More »

July Cyber News Monthly Wrap-up: Key Threats & Trends Impacting Australian Enterprises

JULY NEWS WRAP-UP Australia’s cyber landscape didn’t take a winter break this July. Cybersecurity isn’t just a technical discipline it’s a constant battle against evolving threats, shifting regulations, and unpredictable adversaries. July 2025 was no exception. The past month delivered a mix of headline-grabbing breaches, stealthy malware tactics, and regulatory moves that could reshape how Australian

July Cyber News Monthly Wrap-up: Key Threats & Trends Impacting Australian Enterprises Read More »

The Genea Breach: A Wake-Up Call for Australia’s Cyber Security Standards

The Genea Breach: A Wake-Up Call for Australia’s Cybersecurity Standards In February 2025, Genea Fertility, one of Australia’s leading reproductive health providers, suffered a catastrophic data breach. The Termite ransomware group exposed nearly 1TB of sensitive data across 27 servers, exposing thousands of patients’ personal and medical information. This included Medicare numbers, health insurance details,

The Genea Breach: A Wake-Up Call for Australia’s Cyber Security Standards Read More »

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security Why Cyber Asset Management Matters More Than Ever In today’s hyper-connected business environment, every organisation, regardless of size or industry, relies on a growing ecosystem of digital assets. From cloud workloads and IoT devices to user accounts and third-party integrations, these assets are the backbone

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security Read More »

Cyber Security in M&A: What CISO Must Know to Secure the Deal

Cyber Security in M&A: What CISO Must Know to Secure the Deal As mergers and acquisitions (M&A) accelerate across sectors, Cyber Security has taken centre stage in deal negotiations. It is no longer a technical afterthought but a strategic imperative that can make or break a transaction. For Chief Information Officers (CIOs), the stakes have

Cyber Security in M&A: What CISO Must Know to Secure the Deal Read More »

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack In a groundbreaking move, Google’s AI agent Big Sleep intercepted a critical zero-day vulnerability CVE-2025-6965 before it could be exploited. This proactive detection, targeting the widely used SQLite database, marks a pivotal shift in AI-powered cybersecurity. Unlike traditional methods like fuzzing, big Sleep leverages deep contextual analysis to

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack Read More »