Skip to content
Safe Cyber
  • Home
  • Google Dorks
  • Contact
  • Log-In
Safe Cyber
  • black and white computer keyboard
    Malware Delivery | Phishing Attacks  | Social Engineering

    FileFix attack tricks users into opening infected images

  • Sydney Opera House
    Cyber Incident Trends | Government Cyber Security Investments  | Third-Party System Vulnerabilities

    Cyber incidents in New South Wales government related to third parties have increased fourfold over the past two years

  • a bunch of blue wires connected to each other
    Facial Recognition Technology | Fraud Detection  | Privacy Breach

    Kmart Australia’s implementation of facial recognition technology violated privacy protections

  • NSW government prohibits production / distribution of sexually explicit deepfake content
    Deepfakes | Gender-Based Abuse | Legislation

    NSW government prohibits production / distribution of sexually explicit deepfake content

  • Why Organizations Still Struggle to Protect Our Data: Insights from Privacy Professionals
    Data Protection

    Why Organizations Still Struggle to Protect Our Data: Insights from Privacy Professionals

  • Australia’s Digital ID Scheme: Falling Short of Global Privacy Standards
    Digital Identity

    Australia’s Digital ID Scheme: Falling Short of Global Privacy Standards

  • Human Error: The Weakest Link in Cybersecurity and How to Address It
    Organisational Security

    Human Error: The Weakest Link in Cybersecurity and How to Address It

  • The Risks of Public Internet Access: Insights from an Ethical Hacker
    Public Wi-Fi

    The Risks of Public Internet Access: Insights from an Ethical Hacker

  • 91% of Australian Teens Have a Phone – But Many Aren’t Protecting Their Identity and Location
    Mobile | Telecommunications

    91% of Australian Teens Have a Phone – But Many Aren’t Protecting Their Identity and Location

  • How Your Car Could Be a National Security Threat
    IoT | Vehicles

    How Your Car Could Be a National Security Threat

  • How Cyberattacks on Offshore Wind Farms Could Create Huge Problems
    Cybersecurity | Infrastructure

    How Cyberattacks on Offshore Wind Farms Could Create Huge Problems

  • Notorious Cyberattacks That Targeted Governments
    Cyberattack | Government

    Notorious Cyberattacks That Targeted Governments

  • How Chaos Engineering Is Strengthening Cloud Computing Against Cyber Attacks
    Cloud Computing

    How Chaos Engineering Is Strengthening Cloud Computing Against Cyber Attacks

  • Staying Safe from Social Media Disinformation: Expert Tips
    Fake News

    Staying Safe from Social Media Disinformation: Expert Tips

  • Australia’s Underwater Internet Cables: A Fragile Lifeline to the World
    Telecommunications

    Australia’s Underwater Internet Cables: A Fragile Lifeline to the World

  • CrowdStrike Crash Highlights the Intrusive Nature of Cybersecurity Software
    Infosec

    CrowdStrike Crash Highlights the Intrusive Nature of Cybersecurity Software

  • Protecting NASA’s Spacecraft From Cyberattacks
    Hacking | NASA | Space

    Protecting NASA’s Spacecraft From Cyberattacks

  • The Rise of Malicious AI: FraudGPT and the Next Frontier of Cyber Threats
    AI

    The Rise of Malicious AI: FraudGPT and the Next Frontier of Cyber Threats

  • Mapping Cybercriminals’ Psychological Tactics: A New Model for Catching Online Scammers
    Cybercrime

    Mapping Cybercriminals’ Psychological Tactics: A New Model for Catching Online Scammers

  • Australian Port Cyberintrusion due to Unpatched Citrix Exploit
    Exploits

    Australian Port Cyberintrusion due to Unpatched Citrix Exploit

  • Cyberattack on DP World: Did It Put Australia’s Trade at Risk?
    Cyberattack | Infrastructure

    Cyberattack on DP World: Did It Put Australia’s Trade at Risk?

  • Major Cyberattack on Australian Ports: Possible Sabotage by a Foreign State Actor
    Cyberattack | Cybercrime | Cyberespionage | Cybersecurity | Infrastructure

    Major Cyberattack on Australian Ports: Possible Sabotage by a Foreign State Actor

  • What is Hybrid Warfare and the ‘Grey Zone’?
    Hybrid Warfare

    What is Hybrid Warfare and the ‘Grey Zone’?

  • Stuxnet Revisited: What We Can Still Learn About Infrastructure Cybersecurity
    Australia | Cyberattack | Infrastructure

    Stuxnet Revisited: What We Can Still Learn About Infrastructure Cybersecurity

  • Malicious Cyber Activity in Australia (ACSC / ASD Report 2022–23)
    Australia | Cybersecurity | Infographics

    Malicious Cyber Activity in Australia (ACSC / ASD Report 2022–23)

  • Cybersecurity in National Infrastructure: Lessons from Ukraine and Colonial Pipeline
    Cybersecurity | Infrastructure | National Security

    Cybersecurity in National Infrastructure: Lessons from Ukraine and Colonial Pipeline

  • Cybersecurity Lessons from the Colonial Pipeline Incident
    Infrastructure

    Cybersecurity Lessons from the Colonial Pipeline Incident

  • Ukraine Power Grid Attack – Infrastructure Cybersecurity Lessons For Australia
    Infrastructure | Ukraine

    Ukraine Power Grid Attack – Infrastructure Cybersecurity Lessons For Australia

  • Australian Port Cyberattack Highlights Importance of Protecting Vital Infrastructure
    Infrastructure

    Australian Port Cyberattack Highlights Importance of Protecting Vital Infrastructure

  • Malign Narratives Spread on Social Media Opposed The Voice Referendum
    Australia

    Malign Narratives Spread on Social Media Opposed The Voice Referendum

  • Eavesdroppers, Code Breakers, and Digital Snoops: Inside Australia’s Secret Intelligence Branch
    Espionage

    Eavesdroppers, Code Breakers, and Digital Snoops: Inside Australia’s Secret Intelligence Branch

  • Internet Shutdowns: How Governments Control Access to Information
    internet

    Internet Shutdowns: How Governments Control Access to Information

  • How Drone Submarines Are Turning the Seabed Into a Future Battlefield
    Military Drones | Warfare

    How Drone Submarines Are Turning the Seabed Into a Future Battlefield

  • Does your employer have to tell if they’re spying on you through your work computer?
    Business | Remote Work | Spyware

    Does your employer have to tell if they’re spying on you through your work computer?

  • Staying Safe from Phishing: Expert Cybersecurity Tips
    phishing

    Staying Safe from Phishing: Expert Cybersecurity Tips

  • How Ransomware Gangs Are Evolving and Targeting Cryptocurrencies
    Cryptocurrency | Cybercrime | Ransomware

    How Ransomware Gangs Are Evolving and Targeting Cryptocurrencies

Page navigation

Previous PagePrevious 1 2 3 4 … 10 Next PageNext

Random Password Generator

[password_generator]

Categories

© 2026 Safe Cyber - WordPress Theme by Kadence WP

  • Home
  • Google Dorks
  • Contact
  • Log-In
Search