CPI Consulting
  • About
  • Blog
  • BI-Weekly Insights
  • Microsoft Intune & Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
AI-Powered Device Code Phishing Now Bypasses MFA — What Australian Organisations Must Do Next

AI-Powered Device Code Phishing Now Bypasses MFA — What Australian Organisations Must Do Next

by CPI Staff | Apr 9, 2026 | AI, Blog, Cybersecurity, Entra ID, Microsoft 365 Security

Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint — if MFA is in place, accounts are protected. That assumption just got a serious challenge. Microsoft Defender Security Research has...
The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

by CPI Staff | Apr 2, 2026 | Application Development, Blog, Cybersecurity, Essential 8

Most organisations still treat dependency management as a developer hygiene issue. The Axios npm compromise shows that assumption is now dangerous. When two malicious Axios versions were published on March 31, 2026, the problem was not limited to a bad package update....
Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools

Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools

by CPI Staff | Apr 2, 2026 | AI, AI Coding Agents, Anthropic, Blog, Claude Code, Cybersecurity, Essential 8

The immediate story was easy to misunderstand. On April 1-2 2026, Anthropic confirmed that a Claude Code release packaging issue was caused by human error, not a security breach. Anthropic also said no customer data or credentials were exposed. That matters. But the...
AI Recommendation Poisoning How Attackers Skew What Your AI Suggests

AI Recommendation Poisoning How Attackers Skew What Your AI Suggests

by CPI Staff | Feb 23, 2026 | AI, Blog, Cybersecurity

In this blog post AI Recommendation Poisoning How Attackers Skew What Your AI Suggests we will walk through what recommendation poisoning is, why it’s becoming a real-world risk, and what practical steps you can take to reduce the chance your AI gets “nudged” into...

Recent Posts

  • What Claude Managed Agents Means for Enterprise AI Governance and Vendor Risk
  • AI-Powered Device Code Phishing Now Bypasses MFA — What Australian Organisations Must Do Next
  • Anthropic, OpenAI, and Google Are All Locking In Enterprise Customers. How to Manage Vendor Risk
  • Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected
  • Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users
  • Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now
  • How AI Is Expanding the Attack Surface for Mid-Market Organisations
  • The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance
  • Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools
  • OpenAI’s Superapp Strategy Signals Platform Lock-In at Scale

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune