Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OAIC compliance guide: Australian Privacy Principles (APPs) for web and mobile

The Office of the Australian Information Commissioner’s (OAIC) 2025 approach places more weight on how systems behave than how policies read. It reflects a broader shift that has been building for some time. APP 11, in particular, now rests on understanding the small, routine movements inside modern web and mobile environments. It’s because the environment drift rarely announces itself. New endpoints appear, SDK permissions adjust, and minor code changes influence how data is handled.

How To Combat AI-Enhanced Social Engineering Attacks

Artificial intelligence (AI) has supercharged social engineering. Global management consulting firm McKinsey & Company reported a 1,200% global surge in phishing attacks since the rise of generative AI in the latter half of 2022. And it’s not just the number of attacks that’s climbing; it’s also the success rate. Arctic Wolf’s Human Risk Behavior Snapshot: 2nd Edition reveals that nearly two-thirds of IT and security leaders self-reported falling for a phishing attempt.

Shai-Hulud Malware Targets Numerous NPM Packages in Second-Wave NPM Supply-Chain Attack

On November 24, 2025, researchers identified a renewed supply-chain attack linked to Shai-Hulud malware, revealing that numerous npm packages had been quietly trojanized following the initial wave of malicious activity in September. This second iteration involved compromised versions of popular packages uploaded between November 21, 2025, and November 23, 2025, with additional compromised packages continuing to surface at the time of writing.

From Hats to Heartfelt Advice: Takeaways from a Fireside Chat with CISO @ Crocs

The fireside chat with Crocs CISO Lena Taylor at our Denver event brought together cybersecurity professionals, allies, and leaders for an evening of honest insight and community. From redefining work-life balance to knowing when to pursue new opportunities, Lena shared grounded, real-world wisdom that resonated far beyond career advice. Here’s a look at the biggest takeaways from the discussion and why the night left such a lasting impression.

A New Wave of Supply-Chain Chaos: SHA1HULUD Malware Hijacks NPM Ecosystem and Exfiltrates Developer Secrets

A previously known malware strain, SHA1-HULUD, has resurfaced with a large-scale software supply-chain attack targeting the NPM ecosystem. More than 300 open-source NPM packages were maliciously modified within a short window, leading to the theft of sensitive credentials and over 20,000 compromised GitHub repositories.

Critical WSUS Flaw Exploited: Chinese APTs Deploy ShadowPad Backdoor via CVE-2025-59287

Our intelligence team has uncovered a fresh escalation in state-sponsored cyber espionage targeting enterprise update infrastructure. A critical remote code execution (RCE) vulnerability in Microsoft Windows Server Update Services (WSUS), designated CVE-2025-59287, is now actively exploited by Chinese-linked advanced persistent threat ( APT) groups. These actors leverage the flaw to deploy ShadowPad, a modular backdoor long favored in espionage operations.

Beyond the Basics: Advanced Features in Application Security Testing Software

The landscape of application development is moving faster than ever, driven by AI and cloud-native technologies. While this rapid innovation creates opportunity, it also expands the attack surface, making robust security non-negotiable. As a security leader, you understand that effective application security testing software is the foundation of a strong defense. But in the face of escalating threats, are the basic tools still enough?

Black Friday 2025: Aligning Cyber Resilience and Business Goals to Protect Your Retail Business

Black Friday is only days away, and despite many stores sneaking holiday decorations onto their shelves since mid-September, it marks the official start of the December shopping frenzy. The coming days will not only bring a massive surge in sales, but also an equally large spike in cyber threats. For retailers of all sizes, this peak season is prime time for cybercriminals to exploit vulnerabilities.

Cato CTRL Threat Research: HashJack - Novel Indirect Prompt Injection Against AI Browser Assistants

HashJack is a newly discovered indirect prompt injection technique that conceals malicious instructions after the # in legitimate URLs. When AI browsers send the full URL (including the fragment) to their AI assistants, those hidden prompts get executed. This enables threat actors to conduct a variety of malicious activities.

A Complete Guide to Transport Layer Security (TLS) Authentication

Data security is non-negotiable. Transport Layer Security (TLS) authentication stands as the cornerstone for the protection of data in transit. When it comes to protecting enterprise APIs, systems, and identities, the importance of TLS auth cannot be overstated.