AI Security Risks | Cybersecurity Threats | Data Exfiltration Techniques CometJacking: Single Click Transforms Perplexity’s Comet AI Browser into Data Stealer
Cybersecurity Threats | Industrial IoT Vulnerabilities | SMS Phishing Campaigns Industrial cellular routers in Australia exploited for smishing attacks
Mobile Security | Phishing Threats | User Awareness Phishing is shifting from email to mobile – Is your staff training keeping up?
Malware Campaign | Phishing Attacks | WhatsApp Propagation New self-replicating WhatsApp malware called SORVEPOTEL
Malware Delivery | Phishing Attacks | Social Engineering FileFix attack tricks users into opening infected images
Mobile | Telecommunications 91% of Australian Teens Have a Phone – But Many Aren’t Protecting Their Identity and Location
AI | Deepfake | phishing | Scams | Vishing Voice Imitations: How Scammers Are Using Realistic Fake Voices