Skip to content
Padlokr
  • Home
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • Google Dorks
  • Contact
Padlokr
Mapping Cybercriminals’ Psychological Tactics: A New Model for Catching Online Scammers
Cybercrime

Mapping Cybercriminals’ Psychological Tactics: A New Model for Catching Online Scammers

Major Cyberattack on Australian Ports: Possible Sabotage by a Foreign State Actor
Cyberattack | Cybercrime | Cyberespionage | Cybersecurity | Infrastructure

Major Cyberattack on Australian Ports: Possible Sabotage by a Foreign State Actor

How Ransomware Gangs Are Evolving and Targeting Cryptocurrencies
Cryptocurrency | Cybercrime | Ransomware

How Ransomware Gangs Are Evolving and Targeting Cryptocurrencies

Why 50,000 Ships Are Vulnerable to Cyberattack
Cybercrime | Cybersecurity | Hacking | Transport

Why 50,000 Ships Are Vulnerable to Cyberattack

MOVEit Hack: A Glimpse Into the Future of Cybercrime
Cybercrime | Hacking

MOVEit Hack: A Glimpse Into the Future of Cybercrime

How Criminals Could Exploit AI to Target More Victims
AI | Cybercrime | Social Engineering

How Criminals Could Exploit AI to Target More Victims

The $500 million ATO fraud highlights flaws in the myGov ID system. Here’s how to keep your data safe
Australia | Cybercrime | Dark Web | Data Leaks

The $500 million ATO fraud highlights flaws in the myGov ID system. Here’s how to keep your data safe

Four ways criminals could use AI to target more victims
AI | Cybercrime

Four ways criminals could use AI to target more victims

Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime
Cyberattack | Cybercrime

Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime

Australians lost more than $3bn to scammers in 2022. Here are 5 emerging scams to look out for
Cybercrime | Scams

Australians lost more than $3bn to scammers in 2022. Here are 5 emerging scams to look out for

Binary code on a laptop
Cybercrime | Phishing | Scams

5 big trends in Australians getting scammed

North Korea’s nuclear program is funded by stolen cryptocurrency. Could it collapse now that FTX has?
Cryptocurrency | Cybercrime | Military | North Korea

North Korea’s nuclear program is funded by stolen cryptocurrency. Could it collapse now that FTX has?

What do we know about REvil, the Russian ransomware gang likely behind the Medibank cyber attack?
Cybercrime | Ransomware

What do we know about REvil, the Russian ransomware gang likely behind the Medibank cyber attack?

Cybercrime insurance is making the ransomware problem worse
Cybercrime | Ransomware

Cybercrime insurance is making the ransomware problem worse

Just 25% of businesses are insured against cyber attacks. Here’s why
Cybercrime | Cyberinsurance | Cybersecurity

Just 25% of businesses are insured against cyber attacks. Here’s why

Why are there so many data breaches? A growing industry of criminals is brokering in stolen data
Cybercrime

Why are there so many data breaches? A growing industry of criminals is brokering in stolen data

Online fraudsters, colonial legacies and the north-south divide in Nigeria
Cybercrime

Online fraudsters, colonial legacies and the north-south divide in Nigeria

Random Passphrase

dipping.movie.overblown.unpinned.enviable


Password Generator

LmtkTtg2C0jVOSxSVuZC*7xK$MKf


Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • Agriculture
  • AI
  • App Security
  • Astronomy
  • AUKUS
  • Australia
  • Automobiles
  • Big Data
  • Biometrics
  • Biomimicry
  • Blockchain
  • Business
  • ChatGPT
  • China
  • Climate Change
  • Cloud Computing
  • Complexity
  • Cryptocurrency
  • Cryptography
  • Cyberattack
  • Cybercrime
  • Cyberespionage
  • Cyberinsurance
  • Cyberintelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Breach
  • Data Leaks
  • Data Protection
  • Data Science
  • Data Security
  • Decision Making
  • Deepfake
  • Defence
  • Digital
  • Digital Identity
  • Disinformation
  • Domain Names
  • Drones
  • Education
  • Energy
  • Espionage
  • Essential Services
  • Ethics
  • Facial Recognition
  • Fake News
  • FInancial
  • Food Security
  • Foreign Interference
  • Forensics
  • Fraud
  • Future
  • Gender
  • Government
  • Hacking
  • Healthcare
  • Hybrid Warfare
  • Infosec
  • Infrastructure
  • Insurance
  • Intelligence
  • internet
  • IoT
  • IP address
  • IPv4
  • IPv6
  • Iran
  • Machine Learning
  • Malware
  • Medical
  • Metaverse
  • Midjourney
  • Military
  • Military Drones
  • Misinformation
  • Mobile
  • NASA
  • Neural Networks
  • North Korea
  • Optus
  • Organisational Security
  • OSINT
  • Pacific
  • Passwords
  • Phishing
  • Physics
  • Pretexting
  • Privacy
  • Probability
  • Programming
  • Prompt Engineering
  • Public Wi-Fi
  • QR codes
  • Quantum Computing
  • Ransomware
  • REDSPICE
  • Remote Work
  • Robotics
  • Russia
  • Scams
  • Science
  • Security
  • Smart Devices
  • Smishing
  • Social Engineering
  • Social Media
  • Social Networks
  • Software
  • Space
  • Spam
  • Spyware
  • State Actors
  • Stuxnet
  • Supercomputers
  • Surveillance
  • Telecommunications
  • Tik Tok
  • Transport
  • Ukraine
  • Utilities
  • Vehicles
  • Violence
  • Vishing
  • VR
  • Warfare
  • Terms & Conditions
  • Contact
  • Cookie Policy (AU)
  • Privacy Statement (AU)
Facebook X Instagram

© 2025 Padlokr Cybersecurity

  • Home
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • Google Dorks
  • Contact
Search