Lateral Defence
banner
lateral-d.com
Lateral Defence
@lateral-d.com
Obscurity through security
https://lateral-d.com
Reposted by Lateral Defence
Google DeepMind and Boston Dynamics are teaming up to integrate Gemini into a humanoid robot called Atlas. www.wired.com/story/google...
Google Gemini Is Taking Control of Humanoid Robots on Auto Factory Floors
Google DeepMind and Boston Dynamics are teaming up to integrate Gemini into a humanoid robot called Atlas.
www.wired.com
January 5, 2026 at 9:02 PM
Reposted by Lateral Defence
@apnews.com:
Finnish Children Learn Media Literacy at 3 years old. It’s Protection Against Russian Propaganda
Finnish children learn media literacy at 3 years old. It's protection against Russian propaganda
Finland has been fighting fake news by teaching media literacy to children as young as 3. The Nordic nation includes this in its national curriculum to help citizens recognize disinformation, especial...
apnews.com
January 5, 2026 at 8:48 PM
The State of Anti-Surveillance Design

www.404media.co/the-state-of...
The State of Anti-Surveillance Design
The most effective surveillance-evading gear might already be in your closet.
www.404media.co
January 5, 2026 at 9:48 PM
Critical n8n RCE vulnerability enables full server compromise
Critical n8n RCE vulnerability enables full server compromise
A critical RCE in n8n (CVE-2025-68613) allows full server compromise via workflow expression injection. Affects versions 0.211.0+. Patch immediately.
orca.security
December 23, 2025 at 9:39 PM
France arrests Latvian for installing malware on Italian ferry
France arrests Latvian for installing malware on Italian ferry
French authorities arrested two crew members of an Italian passenger ferry suspected of infecting the ship with malware that could have enabled them to remotely control the vessel.
www.bleepingcomputer.com
December 21, 2025 at 10:42 PM
Project Lion Cage
What if your technology could turn against you?
Project Lion Cage
projectlioncage.com
November 19, 2025 at 9:58 PM
ASD Annual Cyber Threat Report 2024-2025

www.cyber.gov.au/about-us/vie...
www.cyber.gov.au
October 13, 2025 at 10:36 PM
Reposted by Lateral Defence
Small businesses are being warned to re-evaluate their cybersecurity systems after hackers targeted a regional Queensland pharmacy.
Ransomware hackers strike pharmacy as tactics 'evolve'
Small businesses are being warned to re-evaluate their cybersecurity systems after hackers targeted a regional Queensland pharmacy.
www.abc.net.au
September 30, 2025 at 11:08 PM
"Information age warfare in 2025" (back in 2019)

www.australiandefence.com.au/events/event...
Information age warfare in 2025 - Australian Defence Magazine
What role will cyber, space and electromagnetics play in the 2025 timeframe?
www.australiandefence.com.au
September 18, 2025 at 6:26 AM
Enjoying OSINT Symposium 2025 today (and tomorrow)
September 18, 2025 at 4:40 AM
Software packages with more than 2 billion weekly downloads hit in supply-chain attack
Software packages with more than 2 billion weekly downloads hit in supply-chain attack
Incident hitting npm users is likely the biggest supply-chain attack ever.
arstechnica.com
September 15, 2025 at 11:19 AM
Bank Hacking Has Doubled Since 2023 And Investors Are Getting Spooked
Bank Hacking Has Doubled Since 2023 And Investors Are Getting Spooked
Investors are looking to see which banks have the best cyber resiliency.
gizmodo.com
September 6, 2025 at 10:46 PM
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
www.cyber.gov.au
September 6, 2025 at 7:58 AM
Reposted by Lateral Defence
Enforcing existing laws that *already require* them to delete unneeded data would be helpful. This is an existing requirement under Australian Privacy Principle 11.2.
July 21, 2025 at 5:29 AM
Experts say forcing companies to delete data would remove cybercrime 'honey pot'
Forcing companies to delete data would remove cyber 'honey pot', experts say
Crackdowns and lawsuits over data breaches take years. Experts say "the right to erasure" would help individuals hold corporations to account.
www.abc.net.au
July 21, 2025 at 5:33 AM
Reposted by Lateral Defence
Do you know your remote tech contractors?

Hundreds of laptops, bank accounts linked to North Korean fake IT workers scheme seized in major crackdown.
Hundreds of laptops, bank accounts linked to North Korean fake IT workers scheme seized in major crackdown
North Korean operatives worked with individuals in the US, China, United Arab Emirates and Taiwan to successfully obtain employment with more than 100 US companies.
www.politico.com
July 18, 2025 at 2:35 AM
Qantas hit by cyber attack, leaving 6 million customer records at risk of data breach
Qantas says 'significant' portion of 6m customers' data likely stolen
Qantas is warning a "significant" amount of customer data has likely been stolen from its records during a cyber attack against the airline on Monday.
www.abc.net.au
July 2, 2025 at 7:47 AM
From cheap parking to selling data: Former student charged over university hacking
From cheap parking to selling data: Former student charged over university hacking
A former student is accused of hacking her alma mater, altering marks and threatening to sell data.
www.sbs.com.au
June 26, 2025 at 6:49 AM
Reposted by Lateral Defence
Viasat identified as victim in Chinese Salt Typhoon cyberespionage, Bloomberg News reports reut.rs/4629XWi
Viasat identified as victim in Chinese Salt Typhoon cyberespionage, Bloomberg News reports
Viasat Inc has been identified as a victim of the Chinese-linked Salt Typhoon cyberespionage operation during last year's presidential campaign, Bloomberg News reported on Tuesday.
reut.rs
June 18, 2025 at 1:40 AM
Reposted by Lateral Defence
Apple announces that TLS client connections in version 26+ will be using hybrid PQ X25519MLKEM768 by default

support.apple.com/en-us/122756
Prepare your network for quantum-secure encryption in TLS - Apple Support
Learn about quantum-secure encryption in TLS and how to check if your organization's web servers are ready.
support.apple.com
June 9, 2025 at 10:34 PM
Geolocating with GPT: Lessons in Analysis, Not Automation
#OSINT
GPT geolocation — Why it’s a teacher & not a usurper
In this article, I’d like to explore a rather impressive application of AI from a practical, observational perspective — geolocation using…
tompatrickjarvis.medium.com
May 16, 2025 at 1:36 PM
New EU vulnerability database will complement CVE program, not compete with it, says ENISA
New EU vulnerability database will complement CVE program, not compete with it, says ENISA
After the CVE’s program’s near-death experience in April, might the Europeans be looking for a more reliable long-term system?
www.csoonline.com
May 15, 2025 at 3:17 AM