Threat Landscape

Hackers Exploit Microsoft Teams Access Tokens to Steal Chats and Emails

Hackers are exploiting Microsoft Teams access tokens to infiltrate chats, emails, and documents here’s what your security team needs to know and do now. As we close out 2025, a newly disclosed vulnerability in Microsoft Teams has raised serious concerns for Australian enterprises relying on Microsoft 365. Security researchers have uncovered a method that allows […]

Hackers Exploit Microsoft Teams Access Tokens to Steal Chats and Emails Read More »

Safe Use of AI in the Workplace

Safe Use of AI in the Workplace What if your team’s next productivity boost also carried hidden risks? As Australian organisations increasingly adopt generative AI tools, the safe use of AI in the workplace is no longer optional, it’s imperative. Missteps with large language models (LLMs) can lead to data exposure, compliance breaches, and reputational

Safe Use of AI in the Workplace Read More »

Safe use of AI in the workplace: secure business-AI collaboration

Cyber Security in M&A: What CISO Must Know to Secure the Deal

Cyber Security in M&A: What CISO Must Know to Secure the Deal As mergers and acquisitions (M&A) accelerate across sectors, Cyber Security has taken centre stage in deal negotiations. It is no longer a technical afterthought but a strategic imperative that can make or break a transaction. For Chief Information Officers (CIOs), the stakes have

Cyber Security in M&A: What CISO Must Know to Secure the Deal Read More »

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack In a groundbreaking move, Google’s AI agent Big Sleep intercepted a critical zero-day vulnerability CVE-2025-6965 before it could be exploited. This proactive detection, targeting the widely used SQLite database, marks a pivotal shift in AI-powered cybersecurity. Unlike traditional methods like fuzzing, big Sleep leverages deep contextual analysis to

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack Read More »

June Cyber News Monthly Wrap-up

June Cyber News Monthly Wrap-up As FY25 kicks off, Australian cybersecurity leaders are facing a rapidly evolving threat landscape. From regulatory enforcement to critical infrastructure vulnerabilities, June’s cyber headlines underscore the urgent need for proactive security strategies. This month’s wrap-up highlights five of the most impactful stories from June 2025 that every CIO, CSO, and

June Cyber News Monthly Wrap-up Read More »

ENCRYPTION 2.0: PREPARING FOR POST-QUANTUM SECURITY STANDARDS

ENCRYPTION 2.0: PREPARING FOR POST-QUANTUM SECURITY STANDARDS Quantum computing isn’t science fiction anymore, it’s knocking at the door of today’s encryption. Global security agencies and tech giants are racing to prepare for the impact, and the question facing Australian CIOs and CSOs is: Are we ready for the quantum shift? Modern encryption methods, like RSA

ENCRYPTION 2.0: PREPARING FOR POST-QUANTUM SECURITY STANDARDS Read More »

Australia Ransomware Reporting Law 2025: Key Business Obligations

Australia’s New Ransomware Reporting Law Takes Effect: What Your Business Needs to Know As of 30 May 2025, Australia’s Cyber Security (Ransomware Payment Reporting) Rules 2025 are officially in force. This new legal requirement, introduced under Part 3 of the Cyber Security Act 2024, mandates that certain businesses must report ransomware and cyber extortion payments

Australia Ransomware Reporting Law 2025: Key Business Obligations Read More »

Meet Jonathon: Our New Junior Cyber Security Analyst

Meet Our Team: Jonathon – Junior Cyber Security Analyst We’re delighted to introduce Jonathon, our new Junior Cyber Security Analyst here at CommuniCloud. Jonathon brings a strong academic foundation and a genuine enthusiasm for the critical field of cyber security. Having recently completed his Graduate Certificate in ICT (majoring in Cybersecurity and systems administration) at

Meet Jonathon: Our New Junior Cyber Security Analyst Read More »

April 2025 Australian Cyber News: Key Cybersecurity Developments

April Cyber News Monthly Wrap-up: Key Cybersecurity Developments in Australia Forget April, Autumn showers in the Australian cyber realm, April 2025 rained down significant security incidents and stark warnings. From the digital vaults of financial institutions to the sensitive data troves of universities and the vast reserves held by superannuation funds, the cyber threat landscape

April 2025 Australian Cyber News: Key Cybersecurity Developments Read More »

Post-Cyber Attack Recovery: Steps to a Stronger Security Posture

Building Back Stronger: Turning a Cyber Attack into a Catalyst for Growth and Resilience Surviving a cyber attack is a significant event for any business. It can leave you feeling vulnerable, exposed, and potentially uncertain about the future. However, in the aftermath, you stand at a critical crossroads. You can choose to simply return to

Post-Cyber Attack Recovery: Steps to a Stronger Security Posture Read More »