• 07 3184 7575
  • May 11, 2026
  • 0 Comments

Apple, Privacy, and Competition: What a €98.6 Million Fine Tells Us About Data Protection

Today, we’d like to share a story that sits at the intersection of privacy, regulation, and business impact — and it’s a good example of how even well-intentioned security and privacy controls can raise complex questions. Recently, Apple was fined €98.6 million by Italy’s competition authority, which ruled that one of Apple’s privacy features unfairly […]

  • May 4, 2026
  • 0 Comments

Why the Biggest Cyber Threat in 2026 Isn’t a Hack — It’s Trust

Recently, we came across a thought-provoking article about how cyber attacks are changing as we move into 2026. What stood out wasn’t a new software vulnerability or a complex technical exploit — it was the idea that the most successful breaches are now more likely to exploit trust than technology. With artificial intelligence advancing rapidly, […]

  • April 27, 2026
  • 0 Comments

Social Media and Messaging Apps: Simple Security Lessons for Everyday Use

Social media and messaging apps have become part of our daily routine — we check them in the morning, use them for work conversations, and scroll through them at night. Recently, we were reading some guidance on social media security and thought it was worth sharing, because it highlights something many people don’t realise: the […]

  • April 20, 2026
  • 0 Comments

What We Can Learn from the Endesa Data Breach

Today, we’d like to share a recent cybersecurity incident that caught our attention — not because it involved sophisticated hacking techniques, but because it highlights how customer data can still be exposed even when core systems remain operational. It’s a useful case study for any organisation that handles personal or payment information. Spanish energy company […]

  • April 13, 2026
  • 0 Comments

A New Phishing Technique Using Legitimate Hosting — What Businesses Should Know

Hello and welcome! We hope you’re doing well. Today, we’d like to share an interesting cybersecurity article we came across that highlights how phishing tactics are continuing to evolve. What stood out to us is not just who is behind the attack, but how it was carried out — by abusing legitimate online services that […]

  • April 6, 2026
  • 0 Comments

Digital Wallets and Decentralised Identity Are Accelerating

According to digital identity specialists at Ping Identity, the coming year will see rapid growth in digital wallets, decentralised identity, and continuous monitoring of both human and machine identities, driven largely by the rise of AI-enabled cyber threats. Below is our summary and interpretation of the key themes from the article by Shannon Williams, journalist […]

  • March 30, 2026
  • 0 Comments

Cybersecurity Priorities for 2026: What Organisations Need to Prepare For

Insights shared by DigiCert (Australia & Asia-Pacific) At CSB, we regularly review industry research and expert commentary to help organisations prepare for emerging cybersecurity risks. We recently came across an insightful article published by DigiCert, a global digital trust provider, which outlines eight key security priorities expected to shape organisational risk strategies in 2026. We […]

  • March 23, 2026
  • 0 Comments

From Open Source to OpenAI: How Third-Party Risk Is Evolving

For years, the technology industry has embraced the mantra “move fast and break things.” While this approach has accelerated innovation, it has also quietly expanded the attack surface — particularly through third-party software and services. From open-source libraries to AI-enabled coding assistants, modern development tools are helping organisations move faster than ever. Unfortunately, these same […]

  • March 16, 2026
  • 0 Comments

Cybersecurity in 2026: Why Identity, Not Infrastructure, Is the New Front Line

At CSB, we regularly review and share thought-leading insights from respected voices in the global cybersecurity community to help our clients and audiences stay ahead of emerging risks. We would like to highlight an insightful article on cybersecurity trends in 2026, written by Dr. Torsten George, an internationally recognised IT security expert based in the […]

  • March 9, 2026
  • 0 Comments

Tech Support Scammers Exploit Legitimate Websites to Trick Users

Cybercriminals are finding new ways to trick unsuspecting users into calling fraudulent tech support hotlines. A recent campaign uncovered by security firm Malwarebytes reveals how scammers are manipulating legitimate websites of major companies—including Apple, Microsoft, HP, Facebook, Netflix, Bank of America, and PayPal—to display fake support phone numbers. How the Scam Works The attackers purchase […]