Skip to content
Padlokr
  • Home
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • Google Dorks
  • Contact
Padlokr
Major Cyberattack on Australian Ports: Possible Sabotage by a Foreign State Actor
Cyberattack | Cybercrime | Cyberespionage | Cybersecurity | Infrastructure

Major Cyberattack on Australian Ports: Possible Sabotage by a Foreign State Actor

Deterring China isn’t all about submarines. Australia’s ‘cyber offence’ might be its most potent weapon
China | Cyberattack | Cyberwar | Cyberwarfare

Deterring China isn’t all about submarines. Australia’s ‘cyber offence’ might be its most potent weapon

The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner
Australia | Cyberwar

The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner

Russia’s shadow war: Vulkan files leak show how Putin’s regime weaponises cyberspace
Cyberwar | Russia

Russia’s shadow war: Vulkan files leak show how Putin’s regime weaponises cyberspace

Why was TikTok banned on government devices? An expert on why the security concerns make sense
Tik Tok

Why was TikTok banned on government devices? An expert on why the security concerns make sense

Should cyberwar be met with physical force? Moral philosophy can help us decide
Cyberwar

Should cyberwar be met with physical force? Moral philosophy can help us decide

Virtual reality, autonomous weapons and the future of war: military tech startup Anduril comes to Australia
Cyberwar | Cyberwarfare

Virtual reality, autonomous weapons and the future of war: military tech startup Anduril comes to Australia

Russia has been at war with Ukraine for years – in cyberspace
Cyberespionage | Cyberwar | Cyberwarfare

Russia has been at war with Ukraine for years – in cyberspace

Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasons
Cyberattack | Cyberwar | Military | Warfare

Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasons

Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
Cyberwar

Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat

Cyberspace is the next front in Iran-US conflict – and private companies may bear the brunt
Cyberwar

Cyberspace is the next front in Iran-US conflict – and private companies may bear the brunt

US military steps up cyberwarfare effort
Cyberwar

US military steps up cyberwarfare effort

Why Huawei security concerns cannot be removed from US-China relations
Cyberespionage | Cyberwar

Why Huawei security concerns cannot be removed from US-China relations

How Ukraine has defended itself against cyberattacks – lessons for the US
Cyberwarfare | Ukraine | Warfare

How Ukraine has defended itself against cyberattacks – lessons for the US

Cybersecurity in the Pacific: how island nations are building their online defences
Cybersecurity | Pacific

Cybersecurity in the Pacific: how island nations are building their online defences

Intelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraine
Cyberwar

Intelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraine

How much damage could a Russian cyberattack do in the US?
Cyberattack

How much damage could a Russian cyberattack do in the US?

Russia is using an onslaught of cyber attacks to undermine Ukraine’s defence capabilities
Cyberwarfare | Russia

Russia is using an onslaught of cyber attacks to undermine Ukraine’s defence capabilities

cybersecurity_australia
Australia | Cyberwarfare | Defence | Military | REDSPICE

Budget 2022: $9.9 billion towards cyber security aims to make Australia a key ‘offensive’ cyber player

New cyber-attack model helps hackers time the next Stuxnet
Cyberattack | Cyberwar | Stuxnet | Warfare

New cyber-attack model helps hackers time the next Stuxnet

If two countries waged cyber war on each another, here’s what to expect
Cyberwarfare | Warfare

If two countries waged cyber war on each another, here’s what to expect

Cyber peacekeeping is integral in an era of cyberwar – here’s why
Cyberwar

Cyber peacekeeping is integral in an era of cyberwar – here’s why

Hackers could shut down satellites – or turn them into weapons
Hacking | Space

Hackers could shut down satellites – or turn them into weapons

With cyberattacks growing more frequent and disruptive, a unified approach is essential
Cyberwarfare

With cyberattacks growing more frequent and disruptive, a unified approach is essential

Cyberspace and Outer Space: Emerging Frontiers for National Security
Cyberwarfare | Space

Cyberspace and Outer Space: Emerging Frontiers for National Security

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’
Cyberwar | Robotics

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’

Cyberwarfare

Cyber-attacks: what is hybrid warfare and why is it such a threat?

Random Passphrase

negate.gangly.sprawl.defense.justness


Password Generator

hI34DGB&PE(iiWC(0Su!70BKdrCZ


Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • Agriculture
  • AI
  • App Security
  • Astronomy
  • AUKUS
  • Australia
  • Automobiles
  • Big Data
  • Biometrics
  • Biomimicry
  • Blockchain
  • Business
  • ChatGPT
  • China
  • Climate Change
  • Cloud Computing
  • Complexity
  • Cryptocurrency
  • Cryptography
  • Cyberattack
  • Cybercrime
  • Cyberespionage
  • Cyberinsurance
  • Cyberintelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Breach
  • Data Leaks
  • Data Protection
  • Data Science
  • Data Security
  • Decision Making
  • Deepfake
  • Defence
  • Digital
  • Digital Identity
  • Disinformation
  • Domain Names
  • Drones
  • Education
  • Energy
  • Espionage
  • Essential Services
  • Ethics
  • Facial Recognition
  • Fake News
  • FInancial
  • Food Security
  • Foreign Interference
  • Forensics
  • Fraud
  • Future
  • Gender
  • Government
  • Hacking
  • Healthcare
  • Hybrid Warfare
  • Infosec
  • Infrastructure
  • Insurance
  • Intelligence
  • internet
  • IoT
  • IP address
  • IPv4
  • IPv6
  • Iran
  • Machine Learning
  • Malware
  • Medical
  • Metaverse
  • Midjourney
  • Military
  • Military Drones
  • Misinformation
  • Mobile
  • NASA
  • Neural Networks
  • North Korea
  • Optus
  • Organisational Security
  • OSINT
  • Pacific
  • Passwords
  • Phishing
  • Physics
  • Pretexting
  • Privacy
  • Probability
  • Programming
  • Prompt Engineering
  • Public Wi-Fi
  • QR codes
  • Quantum Computing
  • Ransomware
  • REDSPICE
  • Remote Work
  • Robotics
  • Russia
  • Scams
  • Science
  • Security
  • Smart Devices
  • Smishing
  • Social Engineering
  • Social Media
  • Social Networks
  • Software
  • Space
  • Spam
  • Spyware
  • State Actors
  • Stuxnet
  • Supercomputers
  • Surveillance
  • Telecommunications
  • Tik Tok
  • Transport
  • Ukraine
  • Utilities
  • Vehicles
  • Violence
  • Vishing
  • VR
  • Warfare
  • Terms & Conditions
  • Contact
  • Cookie Policy (AU)
  • Privacy Statement (AU)
Facebook X Instagram

© 2025 Padlokr Cybersecurity

  • Home
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • Google Dorks
  • Contact
Search