Articles

Even the Smartest Hackers Fall Back on Phishing: Why Law Firms Need to Wake Up to Supply Chain Sneak Attacks

In the high-stakes world of cybersecurity, you’d think the most dangerous threats come from cutting-edge AI viruses or zero-day exploits straight out of a sci-fi thriller. But here’s the plot twist: even the most sophisticated cybercriminals often start with the basics—like a sneaky email or a smooth-talking phone call. The latest alert from Australia’s ASD’s ACSC (Australian Signals Directorate’s Australian Cyber Security Centre) shines a spotlight on this reality, targeting online code repositories used by developers. But don’t tune out if your firm isn’t knee-deep in coding projects. This isn’t just a techie problem—it’s a stark reminder of how supply ...read more

2025 Phishing Threats in Australia’s Legal Sector: APT Tactics, Technical Analysis, and Mitigation Strategies

As cyber threats evolve rapidly, phishing remains a dominant vector for data breaches, particularly in high-stakes sectors like law. This article provides a technical examination of phishing risks, incorporating the proliferation of advanced persistent threat (APT) tactics into cybercrime, as seen in groups like APT36. We analyse a scenario involving a phishing email mimicking Queensland Courts, outline sector-specific vulnerabilities, and detail mitigation strategies. At Riposte, we specialise in fortifying Australian organisations against these threats, drawing on the latest 2025 insights to build robust defences. Overview of Phishing Threats in Australia 2025 Phishing involves deceptive communications impersonating trusted entities to elicit ...read more

Enhance Your Small Business Security: A Proactive Password Management Approach

For small businesses seeking to enhance their cybersecurity, here are a few tips on how to build a proactive password management strategy to safeguard your sensitive information, and financial transactions. Implementing best practices in password creation, storage, and monitoring is essential. The below tips should point you in the right direction in building your own password management strategy for your business. Password Complexity: Ensure passwords are at least 16 characters long, incorporating a mix of uppercase and lowercase letters, numbers, and special characters. Avoid easily guessable information such as names, birthdays, or common words. Unique Passwords: Avoid reusing passwords across ...read more

Cyber Insurance. It Doesn’t Cover Reputation

In February 2019 a sequence of events that would see LandMark White – one of Australia’s largest property valuation companies – lose many of its major clients, its CEO, an estimated initial financial loss of $7,000,000 and more than 74% of its share value; from which it, and its successor company, Acumentis, following a re-brand and significant investment in attaining an ISO27001 certification, has still not recovered. This tragic chain of events was set in motion by two data breaches; the first in February 2019, which saw approximately 137,000 unique records being posted on the dark web, and a second ...read more

Want to take control of your cyber safety

Riposte is ready to answer the call, enhancing the cyber resilience and safety of small to medium
sized businesses across Australia. Building capacity, knowledge and security.

© Riposte 2025

Website created by RJ New Designs