Your Browser’s Betrayal:Understanding Syncjacking Attacks

In a recent feature from (In)Securities, Bill Toulas of BleepingComputer highlighted an emerging cyber threat known as “syncjacking.” This method exploits the synchronization features of browsers like Chrome to hijack user sessions across devices. By seducing users into installing malicious extensions, attackers gain access to synced data, including passwords, browsing history, and authentication tokens. With […]

Australia’s Digital Destiny: Leading the Charge for Online Freedom

Introduction In today’s interconnected world, the importance of digital rights cannot be overstated. While the European Union is making commendable strides in this arena, Australia stands at a pivotal juncture to assert its leadership in championing online freedom. The nation’s commitment to democratic values, coupled with a robust technological infrastructure, uniquely positions it to influence […]

Cyber (In)Securities – Issue 123

Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the cryptocurrency’s potential to disrupt financial stability. This decision introduces a […]

Cyber (In)Securities – Issue 122

Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]

China’s Open-Source AI: The genie is out of the bottle, and the race is on

China’s AI ambitions have been making headlines for years, but recent developments have thrown a curveball into the global tech landscape. DeepSeek, a Chinese AI company, has managed to develop a top-tier AI model despite facing significant sanctions and restrictions. And here’s the kicker—it’s open source. While open-source AI isn’t new (META’s LLaMA models have […]

A Day in the Life of a Seasoned Security Analyst: Transforming Cybersecurity with 360Sequrity Solutions By Shantanu Bhattacharya

Let me take you on a journey through the eyes of Alex, a seasoned security analyst at SecureBank, a global financial institution. Alex’s team is responsible for protecting sensitive customer data from increasingly sophisticated cyberattacks. Every day is a battle, but this one is about to be different. The Old Normal: A Day of Chaos […]

Welcome New Member – Dale Connell from Trinidad!

Please welcome our newest member from Trinidad, Dale Connell! Dale Connell is a seasoned Cyber Risk and Technology Lead within Deloitte’s Consulting service line at the Trinidad and Tobago office. With extensive expertise in information security strategy and implementation, Dale supports organizations across various industries in developing and executing robust cybersecurity frameworks. His experience spans […]

Welcome new member – Yedhu Krishna Menon

Please welcome our newest member from Kuwait, Yedhu Krishna Menon from Kuwait! Yedhu Krishna Menon is a seasoned Third-Party Risk and Cybersecurity expert with over 15 years of experience, currently serving as the Head of Third-Party Risk Management at Gulf Bank. Throughout his career, he has demonstrated excellence in third-party and supply chain security, cybersecurity, […]