Social media and messaging apps have become part of our daily routine — we check them in the morning, use them for work conversations, and scroll through them at night. Recently, we were reading some guidance on social media security and thought it was worth sharing,...
Welcome to Cyber Safe Resources
Welcome! You’ll find simple, practical resources to help you build safer online habits. We update articles regularly. Be part of our community—subscribe to the newsletter to stay informed and empowered.
What We Can Learn from the Endesa Data Breach
Today, we’d like to share a recent cybersecurity incident that caught our attention — not because it involved sophisticated hacking techniques, but because it highlights how customer data can still be exposed even when core systems remain operational. It’s a useful...
A New Phishing Technique Using Legitimate Hosting — What Businesses Should Know
Hello and welcome! We hope you’re doing well. Today, we’d like to share an interesting cybersecurity article we came across that highlights how phishing tactics are continuing to evolve. What stood out to us is not just who is behind the attack, but how it was carried...
Digital Identity in 2026: Why Continuous Identity Monitoring Will Define Cybersecurity
According to digital identity specialists at Ping Identity, the coming year will see rapid growth in digital wallets, decentralised identity, and continuous monitoring of both human and machine identities, driven largely by the rise of AI-enabled cyber threats.Below...
Cybersecurity Priorities for 2026: What Organisations Need to Prepare For
Insights shared by DigiCert (Australia & Asia-Pacific)At CSB, we regularly review industry research and expert commentary to help organisations prepare for emerging cybersecurity risks. We recently came across an insightful article published by DigiCert, a global...
From Open Source to OpenAI: How Third-Party Risk Is Evolving
For years, the technology industry has embraced the mantra “move fast and break things.” While this approach has accelerated innovation, it has also quietly expanded the attack surface — particularly through third-party software and services.From open-source libraries...
Tech Support Scammers Exploit Legitimate Websites to Trick Users
Cybercriminals are finding new ways to trick unsuspecting users into calling fraudulent tech support hotlines. A recent campaign uncovered by security firm Malwarebytes reveals how scammers are manipulating legitimate websites of major companies—including Apple,...
Cybersecurity in 2026: Why Identity, Not Infrastructure, Is the New Front Line
At CSB, we regularly review and share thought-leading insights from respected voices in the global cybersecurity community to help our clients and audiences stay ahead of emerging risks.We would like to highlight an insightful article on cybersecurity trends in 2026,...
Alleged Administrator of XSS Cybercrime Forum Arrested in Ukraine
Alleged Administrator of XSS Cybercrime Forum Arrested in UkraineIn a major development in the fight against cybercrime, French authorities have confirmed the arrest of an alleged administrator of XSS.is, a long-running Russian-language cybercrime forum notorious for...
UK Student Jailed for Selling Over 1,000 Phishing Kits Used in Global Fraud Scheme
UK Student Jailed for Selling Over 1,000 Phishing Kits Used in Global Fraud SchemeA 21-year-old British man has been sentenced to seven years in prison for developing and distributing phishing kits that enabled cybercriminals to steal sensitive information from...
UK Authorities Arrest Four in Connection with Cyberattacks on Major Retailers
UK Authorities Arrest Four in Connection with Cyberattacks on Major RetailersThe United Kingdom’s National Crime Agency (NCA) has arrested four individuals suspected of involvement in recent cyberattacks that targeted major retail brands across the UK, including Marks...
Arizona Woman Sentenced for Aiding North Korean Fake IT Worker Scheme
Arizona Woman Sentenced for Aiding North Korean Fake IT Worker Scheme That Defrauded 300+ US CompaniesA U.S. woman has been sentenced to over eight years in federal prison for playing a central role in a sophisticated scheme that enabled North Korean IT operatives to...











