Insights

Cybersecurity perspectives
from the frontline.

Analysis, commentary, and practical guidance from SALTT Tech's practitioners.

Claude Mythos Vendor Breach: Implications for Enterprise Exposure Management

Claude Mythos Vendor Breach: Implications for Enterprise Exposure Management A review of the reported Project Glasswing vendor breach and what it means for organisations outside the 40-partner consort...

Read Article
Security 21 Apr 2026
AI Security Tools Expand: What It Means for Aussie Defenders

Two of the largest AI developers — OpenAI and Anthropic — both expanded their security-focused AI capabilities this week. For Australian sec...

Read article
Security 12 Apr 2026
Korrosiv.AI Is Changing Penetration Testing for Australian Organisations

Traditional penetration testing has a coverage problem. A typical web application assessment covers somewhere between 20 and 40 per cent of ...

Read article
Security 12 Apr 2026
AI-Driven Penetration Testing: What It Means for Your Program

Penetration testing has not changed much in its fundamentals over the past two decades. A skilled consultant, a defined scope, a time-boxed ...

Read article
Security 12 Apr 2026
What a Penetration Test Actually Tells You

Most organisations that commission a penetration test understand, broadly, what they are asking for: a skilled consultant to attempt to brea...

Read article
Security 12 Apr 2026
Essential 8 in 2026: What's Changed, What Hasn't, and Where to Focus First

The Essential 8 has been part of the Australian cybersecurity landscape for nearly a decade. In that time it has evolved from a recommended ...

Read article
Security 12 Apr 2026
Russian GRU Router Campaign: What Australian Organisations Must Do

Russian military intelligence unit APT28 has been systematically compromising consumer and small-business routers to conduct cyber espionage...

Read article
29 Aug 2025
BitUnlocker: A deep technical analysis of a full‑volume encryption bypass and what it means for BitLocker threat models

Microsoft researchers have reported a technique, informally dubbed “BitUnlocker”, that enables bypass of BitLocker full volume encryption un...

Read article
12 Oct 2023
Defending against the escalating threat of Deepfakes

Deepfake technology, though impressively innovative, poses serious threats to both individuals and businesses on a global scale. These threa...

Read article
26 Sep 2023
Harness Your Inner Cyber Sleuth With KnowBe4's New 'Hack-A-Cat' Game on Roblox

KnowBe4 has launched an interactive and exciting way to learn cyber security in a relaxed environment, in the form of a game called 'Hack-A-...

Read article