Skip to content
Safe Cyber
  • Home
  • Google Dorks
  • Contact
  • Log-In
Safe Cyber
  • macro photo of five assorted books
    Incident Response  | Playbook Effectiveness | Threat Evolution 

    Incident response playbooks: Turning theoretical plans into effective real-life responses

  • CometJacking: Single Click Transforms Perplexity’s Comet AI Browser into Data Stealer
    AI Security Risks | Cybersecurity Threats | Data Exfiltration Techniques 

    CometJacking: Single Click Transforms Perplexity’s Comet AI Browser into Data Stealer

  • a computer circuit board with a brain on it
    Malicious Software | Open Source Risks  | Security Vulnerabilities

    First malicious AI-MCP server discovered

  • A close-up of a wireless router.
    Cybersecurity Threats | Industrial IoT Vulnerabilities | SMS Phishing Campaigns 

    Industrial cellular routers in Australia exploited for smishing attacks

  • woman holding phone
    Mobile Security | Phishing Threats | User Awareness 

    Phishing is shifting from email to mobile – Is your staff training keeping up?

  • white concrete building under blue sky during daytime
    Information Sharing | Organizational Concerns  | Workforce Management

    US government shutdown affecting CISA hampers threat-intelligence sharing

  • smartphone screen showing icons with logo guessing game
    Malware Campaign | Phishing Attacks  | WhatsApp Propagation 

    New self-replicating WhatsApp malware called SORVEPOTEL

  • a laptop and a computer
    Cybersecurity Threats | Living-off-the-Land Techniques | Ransomware Tactics

    Ransomware-As-A-Service (RAAS) malware changing tactics – again

  • When loading a machine learning model means loading an assailant
    Machine Learning Security Risks | Security Controls and Best Practices  | Supply Chain Threats

    When loading a machine learning model means loading an assailant

  • turned on Android smartphone
    Android Spyware | Cybersecurity Threats | Social Engineering Techniques 

    Android spyware masquerading as Signal encryption plugins

  • KillSec and Yurei execute successful ransomware attacks
    Data Breaches  | Malware Evolution  | Ransomware Attacks

    KillSec and Yurei execute successful ransomware attacks

  • a blurry photo of a city street at night
    API Exploitation  | Identity and Access Management | Security Vulnerability

    OneLogin vulnerability allows API key exploits to obtain OIDC secrets and impersonate applications

  • Increasing concerns about AI cybersecurity
    AI Cybersecurity Concerns | AI Threat Mitigation Strategies  | AI Vulnerabilities

    Increasing concerns about AI cybersecurity

  • black and white computer keyboard
    Cybersecurity Risks | Enterprise Vulnerabilities  | Software Support Lifecycle

    Windows 10 EOL threatens enterprise security networks

  • gray asphalt road between green trees under white clouds and blue sky during daytime
    AI Education | Student Resources | Technology Access 

    UNE Armidale to provide artificial intelligence tools to all students

  • space gray iPhone X
    Digital Identity | Fraud Prevention  | Telecommunications Regulation

    ACMA suggests Digital ID identification verification to buy prepaid mobile SIM cards

  • monitor showing Java programming
    Cybersecurity | Software Exploitation  | Vulnerabilities

    Concerning vulnerability found in GoAnywhere MFT

  • a close up of a computer screen with code code on it
    Cybersecurity Threats | Exploitation of Vulnerabilities  | Malware Distribution 

    Detour Dog Operating DNS-Based Malware Production Facility for Strela Stealer

  • Brain-Computer Interfaces (BCIs): Sources of Fear or Inspiration?
    Brain-Computer Interface | Device Security | Risk Management 

    Brain-Computer Interfaces (BCIs): Sources of Fear or Inspiration?

  • red green and blue lights
    Advanced Malware Techniques  | Cloud-Native Security Threats | DDoS Operations

    Advanced ShadowV2 DDoS-as-a-service botnet operating in the cloud

  • BRICKSTORM cyberespionage malware detected within network infrastructure
    Cyber Espionage | Malware Analysis | Targeted Attacks 

    BRICKSTORM cyberespionage malware detected within network infrastructure

  • black and silver laptop computer
    Emergency Services Impact  | Incident Accountability | Network Management

    Optus claims traffic not redirected from firewall before upgrade

  • silver Android smartphone
    Cybersecurity Threats | National Security Risks  | Telecommunications Fraud

    US Secret Service discovers SIM card farm near the UN in NYC

  • transmission tower during golden hour
    Cybersecurity | Intelligence Sharing | Technology Partnerships 

    Cisco’s collaboration with Splunk and Australian Signals Directorate to enhance threat intelligence sharing

  • yellow and blue data code displayed on screen
    Data Security in Untrusted Environments | Data Sovereignty | Protection of AI and Machine Learning Data Sets 

    Confidential computing protects data during processing

  • blue BMW coupe parked on the road during daytime
    Cybersecurity Incident | Data Breach | Supply Chain Management 

    BMW acknowledges cyber incident, safety audit documents released by hacker

  • silhouette of person across gray clouds
    Airport Disruption | Cyber Attack | Flight Cancellations 

    Collins Aerospace cyberattack critical alert for Australian airports

  • person looking up to the flight schedules
    Airport Disruption | Cyberattack | Flight Cancellations  | Supply Chain Attacks

    European airports disrupted by supply chain cyberattack

  • blue and white car on road
    Emergency Services | Investigation Findings  | Telecommunications Outage

    Optus Triple Zero incident “unlikely” to have contributed to baby’s death

  • red vehicle in timelapse photography
    Emergency Services Communication | Incident Response and Management  | Network Outage

    Thirteen-hour outage of Triple Zero service due to Optus firewall upgrade

  • golf ball on green grass field during daytime
    Cybersecurity Threats | Data Breaches  | Ransomware Attacks

    Heidelberg Golf Club reportedly targeted by Kairos ransomware group

  • black and white computer keyboard
    Malware Delivery | Phishing Attacks  | Social Engineering

    FileFix attack tricks users into opening infected images

  • Sydney Opera House
    Cyber Incident Trends | Government Cyber Security Investments  | Third-Party System Vulnerabilities

    Cyber incidents in New South Wales government related to third parties have increased fourfold over the past two years

  • a bunch of blue wires connected to each other
    Facial Recognition Technology | Fraud Detection  | Privacy Breach

    Kmart Australia’s implementation of facial recognition technology violated privacy protections

  • NSW government prohibits production / distribution of sexually explicit deepfake content
    Deepfakes | Gender-Based Abuse | Legislation

    NSW government prohibits production / distribution of sexually explicit deepfake content

  • Why Organizations Still Struggle to Protect Our Data: Insights from Privacy Professionals
    Data Protection

    Why Organizations Still Struggle to Protect Our Data: Insights from Privacy Professionals

Page navigation

1 2 3 … 10 Next PageNext

Random Password Generator

[password_generator]

Categories

© 2025 Safe Cyber - WordPress Theme by Kadence WP

  • Home
  • Google Dorks
  • Contact
  • Log-In
Search