Auquan is reshaping financial services with AI agents that automate research, risk, and ESG reporting. Trusted by top global institutions, its platform removes manual work so teams can focus on strategy, not formatting.
AI cheating tool Cluely has raised $5.3 million to offer real time, undetectable support during interviews, exams, meetings, and more. Creator Chungin “Roy” Lee says the tool redefines cheating, arguing it helps people work smarter—not break the rules.
Spur, an AI driven startup, has raised $4.5 million to automate website testing. Users type commands like “add to cart” or “apply for a job,” and Spur’s agent simulates the action, detects bugs and gives instant feedback, making quality checks faster and easier for development teams.
Kickstart July with CyberScan: Comprehensive Cyber Defense and AI Insights
A prominent feature includes the exposure of China's privatised cyber operations, where recent leaks from iS00N revealed extensive surveillance activities across Europe, Asia, and North America.
CyberScan Week kicks off in July with a robust lineup of headlines, highlighting significant advancements and challenges in cybersecurity. A prominent feature includes the exposure of China's privatised cyber operations, where recent leaks from iS00N revealed extensive surveillance activities across Europe, Asia, and North America.
This move marks a shift in Beijing's intelligence tactics, leveraging private firms to bypass traditional security protocols and rapidly meet emerging intelligence needs. Meanwhile, discussions on expanding the AUKUS defence pact to include Japan underscore both potential benefits and challenges, with Japan's advanced technology being a valuable asset yet raising concerns about cybersecurity vulnerabilities.
The week also sheds light on alarming cybersecurity alerts, with Rapid7 discovering that popular Windows productivity tools like Notezilla and RecentX have been compromised to deliver malware, posing significant threats to users. The Cybersecurity and Infrastructure Security Agency (CISA) has initiated the Secure by Design pledge, which over 150 software manufacturers have committed to, aiming to enhance cybersecurity from the initial design phase.
Additionally, government agencies from the US, Australia, and Canada are urging the transition of open-source software projects to memory-safe languages like Rust to mitigate vulnerabilities. These updates reflect the ongoing efforts and strategic concerns of political leaders to bolster cyber defence and resilience amidst rising cyber threats.
China's Privatised Cyber Operations Exposed
Recent leaks have unveiled China's increasing reliance on private hacking firms for offensive cyber operations, marking a significant shift in the country's intelligence tactics. The leaked documents from the Chinese firm iS00N revealed extensive activities, including surveillance of email accounts and monitoring of various targets across Europe, Asia, and North America.
This move towards privatisation is part of a broader expansion of espionage efforts targeting not only foreign governments and militaries but also dissidents, journalists, and businesses in critical sectors like defence and technology.
The privatisation trend, which gained momentum in the 2010s amid rising U.S.-China tensions and Xi Jinping’s aggressive policies, allows Beijing to rapidly expand its intelligence capabilities. The iS00N leaks highlight how private companies are being used to bypass traditional security clearances and quickly meet emerging intelligence needs.
Despite operational security lapses, these firms continue to play a crucial role in China's cyber strategy, reflecting the deep integration of private entities in national intelligence operations.
The Potential and Pitfalls of Expanding AUKUS with Japan
Expanding the AUKUS defence pact to include Japan could bring both big benefits and significant challenges. Formed in 2021 to counter China's influence, AUKUS focuses on defence projects like nuclear submarines and high-tech weaponry. Japan's advanced technology and strategic position would be valuable, but integrating them is complex.
Paul Myler, a senior Australian diplomat, mentioned that while AUKUS is open to collaboration with Japan, formal inclusion is not favoured by the U.S. Congress at this time.
Japan's early warning systems and nuclear expertise could enhance AUKUS's defence strategy, but there are concerns about Japan's cyber security vulnerabilities. Adding new members might also complicate the strict U.S. technology sharing rules. With possible political changes in the U.S., the future of Japan's involvement remains uncertain.
The U.S. State Department's efforts to ease technology transfer restrictions within AUKUS show progress, but many diplomatic, security, and political hurdles remain.
Security Alert: Popular Windows Tools Compromised to Deliver Malware
Cybersecurity firm Rapid7 has uncovered that widely-used productivity tools Notezilla, RecentX, and Copywhiz, developed by Conceptworld, have been weaponized to deliver malware. These tools, which are integral to many users for productivity enhancements, have been found to execute malicious software alongside legitimate programs when downloaded from the official Conceptworld website.
Rapid7’s investigation highlighted that the compromised installation packages for these tools were unsigned and had file sizes significantly larger than the legitimate versions, due to the inclusion of malware. The infected installers can steal browser credentials, cryptocurrency wallet information, log clipboard contents and keystrokes, and download additional malicious payloads.
The malware persists on infected systems through a scheduled task, re-executing the primary payload every three hours, posing a serious threat to users.
Impact of CISA’s Secure by Design Pledge on Cybersecurity
The Cybersecurity and Infrastructure Security Agency (CISA) has initiated the Secure by Design pledge, aimed at enhancing cybersecurity practices among software manufacturers. This pledge involves integrating security measures from the initial design phase rather than as an afterthought.
It focuses on enterprise software products and services, including on-premises software, cloud services, and software as a service (SaaS). As of June 2024, more than 150 software manufacturers, including major tech companies, have committed to this pledge, significantly improving product security across critical infrastructure sectors .
Lauren Zabierek, senior advisor for CISA's cybersecurity division, emphasised the importance of this initiative in fostering good security practices and trust among end-users. The pledge's scope extends to both IT and operational technology (OT), aiming to reduce vulnerabilities, enhance network observability, and encourage secure practices such as multi-factor authentication.
Zabierek highlighted ongoing efforts to develop an OT-specific pledge and the critical role of transparency and customer demand in driving security improvements. By promoting these practices, CISA aims to create a more resilient digital landscape, enhancing the security of critical infrastructure sectors reliant on software products and services .
Government Agencies Warn of Memory Safety Risks in Open Source Software
An analysis of 172 projects from the Open Source Security Foundation (OpenSSF) found that over half contain code written in memory-unsafe languages, comprising 55% of their total lines of code. Notably, the largest projects, such as the Linux kernel and Chromium, are predominantly written in these languages.
The guidance also points out that even projects entirely written in memory-safe languages often depend on components that are not. "Mistakes, which inevitably occur, can result in memory-safety vulnerabilities such as buffer overflows and use-after-free," the guidance states. To mitigate these risks, the agencies recommend transitioning critical projects to memory-safe languages like Rust, which can offer performance comparable to traditional memory-unsafe languages.
A Chinese ship captain has been charged in Taiwan for deliberately damaging a subsea cable, marking a rare prosecution tied to infrastructure sabotage. The case highlights growing concerns over global undersea cable vulnerabilities amid rising tensions with China.
Tariffs on tech imports remain in flux as the Trump administration shifts its stance yet again. Mixed messages, steep levies, and retaliatory tariffs from China have left U.S. businesses and consumers caught in the crossfire of an increasingly chaotic trade strategy.
Australia is facing a double threat to its financial security: cyberattacks on major superannuation funds and the fallout from Trump’s “Liberation Day” tariff declaration. Both have exposed deep vulnerabilities in retirement savings, leaving Australia’s future wealth increasingly at risk.
As U.S. tariffs reshape global markets, insights from the All-In Podcast reveal a clash between patriotic optimism and economic reality. Tech elites push for Made-in-America revival, but blind spots in their vision risk weakening the very innovation and investment they champion.