Posts

Why North Korean Hackers Are Targeting Devs Through Visual Studio Code Projects

Image
There’s a new backdoor campaign going around. It’s slick, it’s persistent, and it’s targeting developers — specifically those using Microsoft Visual Studio Code (VS Code) as part of their day-to-day workflow. This one’s coming out of North Korea. And it's not just some throwaway malware — it's part of a broader shift in how state-linked actors are slipping past traditional defences by piggybacking off developer tools and trusted platforms. The Basics: Dev Tools as Attack Vectors Security researchers at Jamf Threat Labs have uncovered the latest iteration of an ongoing campaign (nicknamed Contagious Interview ) that’s weaponising VS Code projects. The method? Attackers instruct targets — usually software engineers — to clone a GitHub, GitLab, or Bitbucket repository and open it in VS Code. They pose as recruiters or hiring managers offering a technical assessment. Once the repo is opened, a malicious tasks.json file is silently executed in the background — taking adv...

đź§  “The 2026 Cyber Stack: What Stays, What Goes, What’s Overhyped”

Image
  We don’t need more tools. We need fewer excuses. In 2026, the average Australian org is still juggling 40+ cyber vendors. That’s not security — that’s bloat. I’ve worked with CISOs, IT leads and boardrooms across government, enterprise, MSPs and SMBs. The story is the same: “We’ve spent the money. Why aren’t we safer?” Because buying tech isn’t a strategy. And most cyber stacks are built on legacy thinking — not business outcomes. Here’s my breakdown of what stays, what goes, and what’s overhyped in the 2026 cyber landscape. ✅ What Stays: The Non-Negotiables in 2026 These are the core capabilities that actually reduce risk and support business resilience. If you’re missing any of these — fix that first. 1. Identity-Led Security (MFA, SSO, Conditional Access) The perimeter is dead. Identity is the new firewall. Enforce MFA everywhere (not just “important” apps) Enable SSO to reduce credential reuse Use conditional access to stop session hijacks and geododging đź§  If you don’t con...

Fortinet vs Cisco — Which One Should Aussie Businesses Choose?

Image
Two giants. Two different philosophies. One important decision. Whether you're refreshing a network, rolling out Zero Trust, or trying to simplify your security stack, chances are you've found yourself asking: “Do we go with Cisco — the enterprise veteran — or Fortinet — the integrated security upstart?” It’s not a casual question. The choice between these two vendors can define your architecture, operational model, and support experience for the next 3–5 years. And too often, it’s made for the wrong reasons — legacy bias, partner pressure, or sticker shock. This post unpacks how Fortinet and Cisco stack up for Australian businesses in 2025 , and how to decide what’s right for your org — not just the loudest vendor pitch. đź§­ Why This Comparison Matters in 2025 A few years ago, Cisco was the default. If you were a government agency, big bank, or national retailer, you bought Cisco. Fortinet? Often seen as “good enough” for smaller businesses. But that script has...

Why SMBs Should Care About SD-WAN (Even If They Don’t Know What It Is)

Image
Let’s be honest. If you're an Aussie SMB with under 200 staff, the term “SD-WAN” probably doesn’t mean much to you. It sounds technical, complex, and like something only big enterprises should care about. But here’s the thing — SD-WAN isn’t just for the big end of town anymore. If you’re still relying on aging MPLS links, clunky VPNs, or the “it’s always been this way” approach to networking, you’re already behind — and you’re probably paying too much for less performance. This post breaks down what SD-WAN is, why it matters for small and mid-sized businesses, and how it can save you money, boost performance, and get you ready for the cloud-first, security-conscious world we now live in. 🔍 What Is SD-WAN? (In Plain English) Let’s skip the jargon. SD-WAN stands for Software-Defined Wide Area Network . Think of it as the modern way to connect your offices, cloud apps, and remote workers — using cheaper internet links instead of expensive, rigid private circuits. Ol...

The Rise of Secure Cloud Connectivity: The New Australian IT Backbone (2025 Edition)

Image
1. Why Cloud Networking Has Overtaken the Data Centre It’s official: traditional on-prem data centres are no longer the heart of Australian enterprise networks. CIOs are shifting to cloud-native connectivity because: Cloud apps power 80–90% of daily work SaaS, IaaS, and PaaS dominate modern business Remote/hybrid teams need fast, secure, anywhere access Backhauling traffic through legacy hubs adds latency, cost, and risk. Today’s networks require direct-to-cloud, edge-aware, Zero Trust-aligned 2. AWS VPC Networking (Simplified) VPC = Your private AWS cloud environment Subnets = Organised traffic zones Security Groups = Firewalls that control access Connections = VPN, Direct Connect, or SD-WAN overlays To build a secure cloud-native network, visibility and segmentation are non-negotiable. 3. Cloudflare’s Role in Security & Performance Cloudflare is evolving beyond CDN: SASE platform for secure access Magic WAN ...

How to Future-Proof Your Network Refresh in Australia

Image
Stop Buying Hardware Start Buying Lifecycle Outcomes The days of big upfront hardware purchases are fading. Today’s successful IT teams don’t “buy boxes” they invest in business outcomes , performance SLAs , and scalable security . Leading Australian organisations are pivoting toward as-a-service offerings and smart lifecycle planning . This ensures fewer surprises, better forecasting, and faster adaptation to risks or new business needs. Key Tech to Consider in 2025 Wi-Fi 6E: Expanded spectrum (6GHz) enables faster speeds, lower latency, and better performance in dense environments. SD-WAN: Replace ageing MPLS. Enable traffic prioritisation, cloud offloading, and failover across hybrid links. Segmentation: Logical segmentation is key to Zero Trust. Eliminate flat, vulnerable networks. Network observability: End-to-end visibility is now essential across users, branches, and clouds. Vendor Strategy: Cisco vs Meraki vs Fortinet Feature Ci...