Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate.
Gone are the days when a suspicious email, SMS, or basic phishing link could easily fool users. As people grow more cautious and cyber-aware, scammers are stepping up their game. They have already begun crafting more complex and convincing schemes to bypass scepticism and lure victims into handing over sensitive information, especially credit card data.
Key Findings:
Incredibly ...
The Voice of Cyber®
Security Awareness
Security Awareness involves educating individuals within an organisation about potential cyber threats, safe online practices, and the importance of maintaining a security-conscious mindset. Security Awareness programs aim to empower employees to recognise and mitigate cybersecurity risks, reducing the likelihood of falling victim to social engineering attacks such as phishing or malware. Effective security awareness efforts encompass regular training sessions, simulated phishing exercises, and the dissemination of relevant information to foster a culture of cybersecurity vigilance.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven ...

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an ...

Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to ...
Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools ...

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence ...

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
No results found.
In The News
Sort By
- Date
- Title
Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take centre stage as ...

16th October 2024 - Australia. Global AI cyber defence leader Darktrace is sounding the alarm for Australian corporate boards to urgently prioritise cyber maturity, following ...
Other key findings include surge of info-stealers and botnets, an increase in evasive malware and a rise in network attacks across the Asia Pacific
Thales today released the findings of its 2024 Data Threat Report for Financial Services organisations, based on a subset of its global Data Threat Report survey which was ...

OpenText Cybersecurity’s 2024 Ransomware Survey: Supply Chain Attacks Surge, Ransom Payments Persist
While companies improve defenses, almost half of respondents still suffer ransomware attacks and the resulting ransom payments only perpetuate the cycle of vulnerability
Titled the "Hidden Costs of DevSecOps," the IDC InfoBrief Reveals Companies Spend an Average of $28K Per Developer Annually on Identifying, Evaluating, and Addressing ...
No results found.
Podcasts On Security Awareness
No results found.