Lateral Defence's Avatar

Lateral Defence

@lateral-d.com.bsky.social

Obscurity through security https://lateral-d.com

43 Followers  |  187 Following  |  54 Posts  |  Joined: 25.04.2024  |  1.5329

Latest posts by lateral-d.com on Bluesky

ASD Annual Cyber Threat Report 2024-2025

www.cyber.gov.au/about-us/vie...

13.10.2025 22:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Ransomware hackers strike pharmacy as tactics 'evolve' Small businesses are being warned to re-evaluate their cybersecurity systems after hackers targeted a regional Queensland pharmacy.

Small businesses are being warned to re-evaluate their cybersecurity systems after hackers targeted a regional Queensland pharmacy.

30.09.2025 23:08 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Information age warfare in 2025 - Australian Defence Magazine What role will cyber, space and electromagnetics play in the 2025 timeframe?

"Information age warfare in 2025" (back in 2019)

www.australiandefence.com.au/events/event...

18.09.2025 06:26 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Enjoying OSINT Symposium 2025 today (and tomorrow)

18.09.2025 04:40 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Software packages with more than 2 billion weekly downloads hit in supply-chain attack Incident hitting npm users is likely the biggest supply-chain attack ever.

Software packages with more than 2 billion weekly downloads hit in supply-chain attack

15.09.2025 11:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Bank Hacking Has Doubled Since 2023 And Investors Are Getting Spooked Investors are looking to see which banks have the best cyber resiliency.

Bank Hacking Has Doubled Since 2023 And Investors Are Getting Spooked

06.09.2025 22:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System

06.09.2025 07:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Chapter 11: APP 11 Security of personal information An APP entity must take active measures to ensure the security of personal information it holds and consider if it is permitted to retain personal information.

www.oaic.gov.au/privacy/aust...

21.07.2025 05:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Enforcing existing laws that *already require* them to delete unneeded data would be helpful. This is an existing requirement under Australian Privacy Principle 11.2.

21.07.2025 05:29 β€” πŸ‘ 32    πŸ” 13    πŸ’¬ 1    πŸ“Œ 0
Preview
Forcing companies to delete data would remove cyber 'honey pot', experts say Crackdowns and lawsuits over data breaches take years. Experts say "the right to erasure" would help individuals hold corporations to account.

Experts say forcing companies to delete data would remove cybercrime 'honey pot'

21.07.2025 05:33 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post-Quantum Cryptography in Kubernetes The world of cryptography is on the cusp of a major shift with the advent of quantum computing. While powerful quantum computers are still largely theoretical for many applications, their potential to...

Post-Quantum Cryptography in Kubernetes-

21.07.2025 02:06 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Hundreds of laptops, bank accounts linked to North Korean fake IT workers scheme seized in major crackdown North Korean operatives worked with individuals in the US, China, United Arab Emirates and Taiwan to successfully obtain employment with more than 100 US companies.

Do you know your remote tech contractors?

Hundreds of laptops, bank accounts linked to North Korean fake IT workers scheme seized in major crackdown.

18.07.2025 02:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Qantas says 'significant' portion of 6m customers' data likely stolen Qantas is warning a "significant" amount of customer data has likely been stolen from its records during a cyber attack against the airline on Monday.

Qantas hit by cyber attack, leaving 6 million customer records at risk of data breach

02.07.2025 07:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
From cheap parking to selling data: Former student charged over university hacking A former student is accused of hacking her alma mater, altering marks and threatening to sell data.

From cheap parking to selling data: Former student charged over university hacking

26.06.2025 06:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Viasat identified as victim in Chinese Salt Typhoon cyberespionage, Bloomberg News reports Viasat Inc has been identified as a victim of the Chinese-linked Salt Typhoon cyberespionage operation during last year's presidential campaign, Bloomberg News reported on Tuesday.

Viasat identified as victim in Chinese Salt Typhoon cyberespionage, Bloomberg News reports reut.rs/4629XWi

18.06.2025 01:40 β€” πŸ‘ 11    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Prepare your network for quantum-secure encryption in TLS - Apple Support Learn about quantum-secure encryption in TLS and how to check if your organization's web servers are ready.

Apple announces that TLS client connections in version 26+ will be using hybrid PQ X25519MLKEM768 by default

support.apple.com/en-us/122756

09.06.2025 22:34 β€” πŸ‘ 46    πŸ” 15    πŸ’¬ 3    πŸ“Œ 1
Preview
India's alarm over Chinese spying rocks the surveillance industry Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require manufacturers of CCTV cameras to submit hardware, software and source code for assessment in government labs, official documents and company emails show.

India's alarm over Chinese spying rocks the surveillance industry reut.rs/45AoDvs

28.05.2025 03:40 β€” πŸ‘ 40    πŸ” 18    πŸ’¬ 1    πŸ“Œ 2
Preview
GPT geolocationβ€Šβ€”β€ŠWhy it’s a teacher & not a usurper In this article, I’d like to explore a rather impressive application of AI from a practical, observational perspectiveβ€Šβ€”β€Šgeolocation using…

Geolocating with GPT: Lessons in Analysis, Not Automation
#OSINT

16.05.2025 13:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
New EU vulnerability database will complement CVE program, not compete with it, says ENISA After the CVE’s program’s near-death experience in April, might the Europeans be looking for a more reliable long-term system?

New EU vulnerability database will complement CVE program, not compete with it, says ENISA

15.05.2025 03:17 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
CVE program averts swift end after CISA executes 11-month contract extension After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would ...

Hmm, missed this last month:
β€œCVE program averts swift end after CISA executes contract extension”

15.05.2025 03:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Seven Steps To Digital Security Digital security is as much of a mindset as it is a toolkit, and there are concepts to consider regardless of whether you're first getting started or you're a seasoned veteran. Before you start seekin...

Digital security doesn't start and end with tools, it's just as often about a mindset.

30.04.2025 19:01 β€” πŸ‘ 98    πŸ” 20    πŸ’¬ 2    πŸ“Œ 0
Preview
Hackers have 'compromised' almost 100 bank employees, experts say Cybercriminals have stolen and shared almost 100 staff logins for Australia's Big Four banks, putting those businesses at a higher risk of mass data theft and ransomware attacks, cyber security resear...

Cybercriminals have stolen almost 100 staff logins at the Big Four banks, experts say

01.05.2025 00:47 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Infostealers Harvest Over 30,000 Australian Banking Credentials Dvuln researchers highlighted the growing impact of infostealers on the cybercrime landscape, enabling attackers to bypass traditional defenses

Infostealers Harvest Over 30,000 Australian Banking Credentials

01.05.2025 00:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google Spoofed Via DKIM Replay Attack: A Technical Breakdown Learn how a convincing Google spoof used a DKIM replay attack to bypass email security and trick users with a fake subpoena. A real-world phishing example you need to see.

Google Spoofed Via DKIM Replay Attack:
A Technical Breakdown

easydmarc.com/blog/google-...

24.04.2025 22:15 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
JUICYJAM: How Thai Authorities Use Online Doxxing to Suppress Dissent - The Citizen Lab A sustained, coordinated social media harassment and doxxing campaign – which we codenamed JUICYJAM – targeting the pro-democracy movement in Thailand has run uninterrupted, and unchallenged, since at...

JuicyJam: How Thai Authorities Use Online Doxxing to Suppress Dissent

citizenlab.ca/2025/04/how-...

24.04.2025 22:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Document My Pentest: you hack, the AI writes it up! Tired of repeating yourself? Automate your web security audit trail. In this post I'll introduce a new Burp AI extension that takes the boring bits out of your pen test. Web security testing can be a

Document My Pentest: you hack, the AI writes it up!

portswigger.net/research/doc...

24.04.2025 21:59 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How I Used AI to Create a Working Exploit for CVE-2025-32433 Before Public PoCs Existed A step-by-step walkthrough of how I leveraged AI to analyze, understand, and exploit the Erlang SSH pre-authentication vulnerability (CVE-2025-32433) without any existing public proof of concept. Lear...

"How I Used AI to Create a Working Exploit for CVE-2025-32433 Before Public PoCs Existed"

platformsecurity.com/blog/CVE-202...

24.04.2025 21:40 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Model Context Protocol has prompt injection security problems As more people start hacking around with implementations of MCP (the Model Context Protocol, a new standard for making tools available to LLM-powered systems) the security implications of tools built ...

Model Context Protocol has prompt injection security problems

24.04.2025 00:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The β€œS” in MCP Stands for Security Spoiler: it doesn’t. But it should.

The β€œS” in MCP Stands for Security

24.04.2025 00:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Bug hunter obtains an SSL cert for Alibaba Cloud in 5 steps : 10 other certificates 'were mis-issued and have now been revoked'

Since learning of that flaw, SSL.com has revoked 11 wrongly issued certificates – one of them for Alibaba.

22.04.2025 21:53 β€” πŸ‘ 12    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

@lateral-d.com is following 20 prominent accounts