
Articles
-
1 week ago |
ia.acs.org.au | Leonard Bernardone
More than 184 million user logins for the likes of the Department of Home Affairs, Facebook, Google and many others have been exposed in what appears to be a large infostealer campaign. Security researcher Jeremiah Fowler first discovered the leaked logins in early May when he came upon a “publicly exposed database” which contained fully 184,162,718 unique logins and passwords.
-
1 week ago |
ia.acs.org.au | Leonard Bernardone
EXCLUSIVE “Don't go to the police or the FBI for help and don't tell anyone that we attacked you.” That’s how ransomware gang Lockbit greets its victims. In ransom notes left on compromised systems, the Russia-linked group directs its targets to a “secret chat” link where it promises to restore their sensitive data – for a price. “[The police] will forbid you from paying the ransom and will not help you in any way,” one note read.
-
2 weeks ago |
ia.acs.org.au | Leonard Bernardone
More than $4.2m in Bitcoin, a beachside mansion, and a luxury car and are among the assets forfeited from a Queensland man after police identified the goods as suspected proceeds of crime. Authorities started investigating 32-year-old Shane Duffy in 2018 after the Australian Transaction Reports and Analysis Centre was tipped off to “suspicious Bitcoin transactions” linked to a “Queensland man previously convicted of hacking” in the US.
-
3 weeks ago |
ia.acs.org.au | Leonard Bernardone
Australia’s latest data breach tally topped more than 1,100 incidents reported to the national privacy watchdog last year, marking the highest total since mandatory breach notifications were introduced in 2018. In statistics released Tuesday, the Office of the Australian Information Commissioner (OAIC) said it received 595 data breach notifications in the second half of 2024, bringing the year to a total of 1,113 notifications and marking a 25 per cent increase from 2023.
-
1 month ago |
ia.acs.org.au | Leonard Bernardone
Security experts have found almost 100 compromised login credentials for staff at Australia’s Big Four banks. Cyber intelligence firm Hudson Rock identified the stolen credentials through multiple data giveaways and illicit data sales tracked across the dark web and messaging platform Telegram. The credentials reportedly belonged to contractors or current and former staff, and used corporate email addresses with domain names such as “anz.com.au” or “cba.com.au”.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- Tweets
- DMs Open

I analysed 12 leaked ransom chats from Lockbit this week, turns out their hackers run negotiations like a helpdesk. Affiliates stuck to a consistent playbook, and one hacker even complained the victim was interrupting their "lunch break". More at IA 👇 https://t.co/H8r1MO0GlM

RT @AMLane_au: Comments from yours truly in this article explaining Proceeds of Crime legislation. #cryptonews #cryptolaw #proceedsofcrime…

Anyone else trying to check their super balance right now? 👀