<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>All Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Fri, 24 Apr 2026 01:57:56 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>All Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Vercel Supply Chain Incident: Why OAuth Tokens Are the New Passwords</title>
		<link>https://www.vertexcybersecurity.com.au/the-vercel-supply-chain-incident-why-oauth-tokens-are-the-new-passwords/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-vercel-supply-chain-incident-why-oauth-tokens-are-the-new-passwords</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 01:57:55 +0000</pubDate>
				<category><![CDATA[Encryption]]></category>
		<category><![CDATA[database encryption]]></category>
		<category><![CDATA[OAuth token security]]></category>
		<category><![CDATA[supply chain breach]]></category>
		<category><![CDATA[Vercel cyber attack]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10625</guid>

					<description><![CDATA[Discover how the Vercel supply chain attack highlights the need to protect OAuth tokens like passwords through encryption and strict governance.]]></description>
		
		
		
			</item>
		<item>
		<title>Beyond the Smash and Grab: How AI is Turning Supply Chain Breaches into Multi-Million Dollar Disasters</title>
		<link>https://www.vertexcybersecurity.com.au/beyond-the-smash-and-grab-how-ai-is-turning-supply-chain-breaches-into-multi-million-dollar-disasters/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beyond-the-smash-and-grab-how-ai-is-turning-supply-chain-breaches-into-multi-million-dollar-disasters</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 01:53:35 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI cyber attacks]]></category>
		<category><![CDATA[business cyber security]]></category>
		<category><![CDATA[cyber leverage]]></category>
		<category><![CDATA[Supply Chain Security]]></category>
		<category><![CDATA[Vercel incident]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10623</guid>

					<description><![CDATA[Learn how AI is evolving cyber attacks from quick smash-and-grab thefts to complex supply chain breaches, and discover strategies to protect your organisation.]]></description>
		
		
		
			</item>
		<item>
		<title>The One Threat as Damaging to Australia as Cyber Attackers: The Billions of Dollars Stolen Taxes from Gas Exports</title>
		<link>https://www.vertexcybersecurity.com.au/the-one-threat-as-damaging-to-australia-as-cyber-attackers-the-billion-dollar-stolen-taxes-from-gas-exports/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-one-threat-as-damaging-to-australia-as-cyber-attackers-the-billion-dollar-stolen-taxes-from-gas-exports</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:18:04 +0000</pubDate>
				<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[cyber attackers]]></category>
		<category><![CDATA[Data Centres]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[Natural Gas Tax]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10573</guid>

					<description><![CDATA[Discover why the stolen taxes from gas exports are as damaging to Australia as cyber attackers, and why a seventy-five per cent tax could fund our digital future.]]></description>
		
		
		
			</item>
		<item>
		<title>The Two Million Dollar Vercel Breach: Why Your AI Tools Must Prioritise Cyber Security First</title>
		<link>https://www.vertexcybersecurity.com.au/the-two-million-dollar-vercel-breach-why-your-ai-tools-must-prioritise-cyber-security-first/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-two-million-dollar-vercel-breach-why-your-ai-tools-must-prioritise-cyber-security-first</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 06:44:42 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[OAuth permissions]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[Vercel breach]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10571</guid>

					<description><![CDATA[The two million dollar Vercel breach highlights the dangers of granting broad permissions to AI tools. Learn why your organisation needs a security-first approach to AI adoption and third-party risk.]]></description>
		
		
		
			</item>
		<item>
		<title>5,600 Sensitive Documents Stolen: Lessons from the NSW Treasury Insider Data Breach</title>
		<link>https://www.vertexcybersecurity.com.au/5600-sensitive-documents-stolen-lessons-from-the-nsw-treasury-insider-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5600-sensitive-documents-stolen-lessons-from-the-nsw-treasury-insider-data-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 06:41:03 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[NSW Government]]></category>
		<category><![CDATA[Security Monitoring]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10569</guid>

					<description><![CDATA[A significant data breach at the NSW Treasury involving 5,600 documents highlights the danger of insider threats. Learn how to enhance your organisation's security monitoring.]]></description>
		
		
		
			</item>
		<item>
		<title>The Digital High: Why Cyber Hacking is So Addictive for Beginners</title>
		<link>https://www.vertexcybersecurity.com.au/the-digital-high-why-cyber-hacking-is-so-addictive-for-beginners/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-digital-high-why-cyber-hacking-is-so-addictive-for-beginners</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 23:12:17 +0000</pubDate>
				<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Addiction]]></category>
		<category><![CDATA[Cyber Hacking]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10560</guid>

					<description><![CDATA[Explore the psychological reasons why cyber hacking is so addictive for beginners, the dangerous cycle of criminal escalation, and why cybercrime never pays in the long run.]]></description>
		
		
		
			</item>
		<item>
		<title>The PowerSchool Ransomware Heist: Why a 20-Year-Old is Heading to Federal Prison</title>
		<link>https://www.vertexcybersecurity.com.au/the-powerschool-ransomware-heist-why-a-20-year-old-is-heading-to-federal-prison/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-powerschool-ransomware-heist-why-a-20-year-old-is-heading-to-federal-prison</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 23:06:24 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Matthew Lane]]></category>
		<category><![CDATA[PowerSchool]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10556</guid>

					<description><![CDATA[A 20-year-old receives 4 years in prison for the historic PowerSchool breach. Learn how teenage hackers are recruited on gaming platforms and why cybercrime never pays.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Publicly Sharing Bank Details Puts Your Business at Risk</title>
		<link>https://www.vertexcybersecurity.com.au/why-publicly-sharing-bank-details-puts-your-business-at-risk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-publicly-sharing-bank-details-puts-your-business-at-risk</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 01:21:01 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[bank account protection]]></category>
		<category><![CDATA[business payments]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Phishing Prevention]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10552</guid>

					<description><![CDATA[Discover why publicly listing your bank details can lead to targeted phishing attacks and learn safer strategies for receiving business payments.]]></description>
		
		
		
			</item>
		<item>
		<title>Why the &#8220;SaaS is Dead&#8221; Narrative Fails the Math Test</title>
		<link>https://www.vertexcybersecurity.com.au/why-the-saas-is-dead-narrative-fails-the-math-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-the-saas-is-dead-narrative-fails-the-math-test</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 01:02:34 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Infrastructure Costs]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10548</guid>

					<description><![CDATA[Explore why the "SaaS is dead" narrative fails to account for the real costs of infrastructure, maintenance, and cyber security in the age of AI.]]></description>
		
		
		
			</item>
		<item>
		<title>Booking.com Security Incident: Is Your Web Platform Truly Secure?</title>
		<link>https://www.vertexcybersecurity.com.au/booking-com-security-incident-is-your-web-platform-truly-secure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=booking-com-security-incident-is-your-web-platform-truly-secure</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 01:32:55 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[API vulnerability]]></category>
		<category><![CDATA[Booking.com breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[web security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10545</guid>

					<description><![CDATA[The recent Booking.com security incident highlights the risks of insecure web APIs. Learn how to protect your organisation from similar data breaches and phishing attacks.]]></description>
		
		
		
			</item>
	</channel>
</rss>
