AI is driving a rapid increase in sophisticated cyberattacks, and Australia’s high median wealth, abundant resources, and geopolitical influence make it a prime target for both cybercrime groups and advanced persistent threats (APTs). Cyble has documented more than 50 threat groups active in Australia in 2025, including ransomware and cybercrime groups, hacktivists, and APTs linked to China, Russia, Iran, and North Korea. Cyble dark web researchers have investigated 71 major cyber incid...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
Despite being tucked in the bottom corner of the world map, Australia is high up on the threat map for cybercriminals. The Australian dark web game has evolved over the years, and now it is a thriving economy for hackers, criminals, and hacktivist groups. This economy now sells and purchases stolen corporate data, personal records, and privileged credentials that are openly traded. What was once a niche underground network now powers a shadow industry worth millions, exploiting every stole...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
Cyble Vulnerability Intelligence researchers tracked 971 vulnerabilities over the past week, as monthly Patch Tuesday releases from vendors yielded a high number of new bugs. More than 142 of the disclosed vulnerabilities already have publicly available Proofs-of-Concept (PoCs), a rate that’s lower than the recently seen 20-30% exploitation rate, but still shows how quickly new vulnerabilities can be exploited. 54 vulnerabilities were rated as critical under CVSS v3.1, while 33 received...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
In the latest weekly vulnerability insights to clients, Cyble Research & Intelligence Labs has spotlighted a concerning surge in security weaknesses affecting a broad spectrum of digital products and services. From July 30 to August 5, 2025, Cyble’s vulnerability intelligence module tracked 717 new vulnerabilities. Among these, more than 222 come with publicly available Proof-of-Concept (PoC) exploits, signaling an increased likelihood of imminent cyberattacks and reducing the defenders...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
Introduction If the first half of 2025 taught us anything, it’s that ransomware isn’t just back — it’s bigger, smarter, and far more coordinated. And at the heart of this surge, three names rose to the top. Together, they accounted for over a third of all reported ransomware attacks globally – more than 1,000 incidents. No sector was safe. No region is untouched. These threat actors are no longer operating in the dark shadows — they’re orchestrating global disruptions with s...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
Qilin ransomware group tops June 2025 with 86 victims, surpassing rivals in a shifting threat landscape. Read Cyble’s analysis of top ransomware groups.| Cyble
Ransomware groups like Qilin dominated July attacks with 73 victims. New variants and groups, including AiLock and Crux, target critical industries globally.| Cyble
The global threat landscape in the first half of 2025 has not only intensified but also splintered across regions with clear intent and growing precision. According to Cyble’s Global Threat Landscape: H1 2025 report, while ransomware attacks and zero-day exploits rose across the board, the distribution of these incidents varied significantly by geography. Regional targeting is no longer incidental—it is deliberate, adaptive, and often aligned with sectoral weaknesses and geopolitical faul...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
A newly released joint advisory from leading global cybersecurity and intelligence agencies, including Australia’s ASD and ACSC, the FBI, CISA, the UK’s NCSC, and others, reveals a sharp escalation in Scattered Spider's cybercriminal activities. This update, published on July 29, outlines new tactics, techniques, and procedures (TTPs) gathered from recent FBI investigations, including enhanced use of ransomware, social engineering, and credential theft. Originally issued on November 16, 2...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
Cyble Vulnerability Intelligence researchers tracked 737 vulnerabilities over the last week, and more than 145 of the disclosed vulnerabilities already have publicly available Proof-of-Concepts (PoCs), just below the 21% exploitation rate observed by Cyble last week. Of the hundreds of IT and industrial control system (ICS) vulnerabilities examined this week, Cyble researchers flagged more than a dozen vulnerabilities for high-priority attention by security teams. The following are highlights...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
The maritime industry, responsible for as much as 90% of global trade, is increasingly becoming a target of cyber threat actors. A recent Cyble report to clients documented more than a hundred cyberattacks by advanced persistent threat (APT) groups, financially motivated threat actors, ransomware groups, and hacktivists, as the maritime and shipping industry has become a prime target amid growing geopolitical conflict. The trend has become particularly pronounced in the last year. Pro-Pal...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
ACSC alerts on CVE-2025-53770, a SharePoint flaw under active attack. Urges immediate patching to protect on-premises systems from remote code execution.| Cyble
Cyble investigates the DOGE BIG BALLS Ransomware, analyzing its operation and the false ties made to Edward Coristine.| Cyble
JPCERT's Q1 2025 report shows rising phishing, defacements, and VPN flaws, highlighting key cyber threats and response challenges in Japan and beyond.| Cyble
Stay updated with cybersecurity insights, expert blogs, and the latest news on dark web monitoring, data breaches, and malware.| Cyble
One of the vulnerabilities highlighted by Cyble has more than 500,000 internet-facing exposures.| Cyble
Discover what is malware explore its dangerous types, and learn essential tips to protect your devices from cyber threats.| Cyble
Cybersecurity Solutions by Award Winning Cyber Threat Intelligence Company for Individuals, Business & Government Bodies, Cyble.| Cyble
Cyble highlights critical IT and ICS vulnerabilities, including actively exploited flaws in Ivanti, Versa, and Microsoft detected via its honeypot sensors.| Cyble
Cyble reports on critical IT vulnerabilities in SAP, Ivanti, Fortinet, ASUS, and others. Urgent patches needed for IT and ICS systems to prevent attacks.| Cyble
Cyble's incident management tools help you detect, respond, and resolve threats faster. Secure your business with smarter alert handling today!| Cyble
Experience the award-winning Cyble Vision Threat Intelligence Platform. Schedule a demo and witness its power in action. Discover how it safeguards against threats and provides real-time insights for your cybersecurity needs| Cyble
A cybersecurity threat actor, defined as an individual, group, organization, or entity engaged in activities designed to compromise computer systems, or information, can have various motivations. Read more about threat actors at Cyble!| Cyble