“Please wait, your document is loading.”
That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware.
In the latest ColorTokens Threat Advisory, we tracked how threat actors are not just breaching networks, but embedding themselves deeply, moving laterally, disabling defenses, and stealing data in ways that bypass even modern security controls.
This blog highlights the most urgent stories from the advisory and shares how to stop these attackers before they spread.
Cisco Firewalls and the VPN Entry Point That Refuses to ...
The Voice of Cyber®
Security Awareness
Security Awareness involves educating individuals within an organisation about potential cyber threats, safe online practices, and the importance of maintaining a security-conscious mindset. Security Awareness programs aim to empower employees to recognise and mitigate cybersecurity risks, reducing the likelihood of falling victim to social engineering attacks such as phishing or malware. Effective security awareness efforts encompass regular training sessions, simulated phishing exercises, and the dissemination of relevant information to foster a culture of cybersecurity vigilance.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

Australia faces another significant cybersecurity breach, this time targeting superannuation funds managing trillions in retirement savings. This attack highlights a severe ...

Every year, organisations and consumers alike lose billions of dollars to online scams. Busting fraud and protecting users is all about finding and investigating the ...

Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data.

Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns.
The rapid rise and evolution ...

Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.
No results found.
In The News
Sort By
- Date
- Title
One in Three Australian Ransomware Victims Hit Multiple Times as Security Gaps Persist.
New International Research Shows Ransomware Thrives in Complex and Fragmented IT ...
Sydney, Australia, 7 August 2025 –KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management (HRM), is proud to highlight the ...
Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them ...
In recent weeks, Microsoft has observed Octo Tempest, also known as Scattered Spider, impacting the airlines sector, following previous activity impacting retail, food ...
KnowBe4’s Q2 2025 Phishing Simulation Roundup report underscores employees’ continued vulnerability to malicious emails that appear familiar, whether from HR, IT, or major brands.
Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security
July 15, 2025 – Trustwave, a global cybersecurity and managed security services leader, has announced the launch of Managed Phishing for Microsoft, an advanced service ...
No results found.




