Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate.
Gone are the days when a suspicious email, SMS, or basic phishing link could easily fool users. As people grow more cautious and cyber-aware, scammers are stepping up their game. They have already begun crafting more complex and convincing schemes to bypass scepticism and lure victims into handing over sensitive information, especially credit card data.
Key Findings:
Incredibly ...
The Voice of Cyber®
TECHNOLOGY
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

With artificial intelligence playing a growing role in identity fraud and leading to mounting losses, organisations are under pressure to confront the challenge and act on it.

The business case for modernisation has never been stronger, as the dynamic nature of IT environments and the evolving threat landscape put security teams under increased pressure.

Rising cybercrime rates in Australia and New Zealand are an escalating concern as cybercriminals aren't necessarily improving their methods but are taking advantage of ...

AI is transforming industries worldwide, and Australia is no exception. Australia, despite previously lagging in adoption of AI technologies, is now charging ahead.
But as ...

Introduction
The often overlooked yet backbone for the Australian market - is small and medium-sized businesses (SMBs). SMB’s don’t often get spoken about in the media in ...

Tom Casey Senior Vice President, Products & Technology at Splunk recently presented at Cisco Live in Melbourne about the critical intersection of digital resilience, ...
No results found.
In The News
Sort By
- Date
- Title
Integration accelerates breach identification and containment, effectively stops lateral movement of threats across the enterprise
Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in ...
Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation ...
Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential ...
Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into ...
“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
No results found.