A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.
The Voice of Cyber®
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t ...

Introduction
Australia is fast becoming a hotspot for AI-generated cybercrime. Risks that were once theoretical are now costing businesses millions, even as security teams ...

As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled ...

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five ...
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, ...

Introduction
Cybercrime has matured into a highly structured global economy, rivalling legitimate industries in sophistication and profitability. The World Economic Forum ...
No results found.
In The News
Sort By
- Date
- Title
Community beta tool invites defenders to collaborate and help shape a new approach to exposing credential‑stealing attacks
Critical vulnerabilities doubled year-over-year, signalling rising risk severity as AI-driven discovery and expanding attack surfaces reshape the Microsoft security landscape ...
ESET’s standalone eCrime reports provide security teams with curated, high‑quality insights into incidents, including key lessons, IoCs, hunting rules, and guidance to ...
“This recognition reflects a major shift in cybersecurity—organizations are actively looking for ways to automate threat hunting, reduce SOC workload, and improve incident ...
Australian-owned cyber security company opens local developer community with free database access
Applies behaviour profiling and analytics to the digital workforce, giving security teams full visibility into how users and AI agents interact across the enterprise
No results found.




