• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - Genea
Tag:

Genea

Tech

Cyber attacks that occurred this year and how you can protect your data

by Chief Editor December 27, 2025
written by Chief Editor

It’s been a relentless year for cyber security, with millions of Australians
seeing their personal data fall into the hands of increasingly sophisticated
criminals. From healthcare providers to financial institutions and even
government agencies, no sector has been immune. The fallout isn’t just
personal – businesses are facing potentially crippling financial losses.

<h2 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
The Rising Tide of Data Breaches

The Office of the Australian Information Commissioner (OAIC) recently
launched a
Notifiable Data Breaches (NDB) statistics dashboard
to provide transparency on the scale and nature of these incidents. Between
January and June, 532 breaches were reported, with malicious attacks
accounting for over half. And experts warn the second half of the year
shows no sign of slowing down.

But the publicly reported numbers may only be the tip of the iceberg. As ANU
cybersecurity expert Vanessa Teague points out, the most damaging breaches
often go undetected. “The most effective attacks are surreptitious… there’s
no particular reason an intrusion would be noticed. Even if it is noticed
by the service provider, the affected people may not be notified,” she
explains.

<figure
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_outdentDesktopijbiK Figure_figure__xLyBy Figure_docImageDSvk4″
data-print=”inline-media”
data-component=”Figure”
id=”106120604″
data-uri=”coremedia://imageproxy/106120604″

<img
alt=”Woman with brown hair and standing outside smiles up close at the camera.”
class=”Image_image__5tFYM ContentImage_image__DQ_cq”
sizes=”100vw”
src=”https://live-production.wcms.abc-cdn.net.au/07d426a0c16d0f5400e6962c73f2fc39?impolicy=wcms_crop_resize&amp;cropH=1294&amp;cropW=1941&amp;xPos=0&amp;yPos=209&amp;width=862&amp;height=575”
loading=”lazy”
data-component=”Image”
data-lazy=”true”
/>

Vanessa Teague says cyber attacks are constantly improving.

Supplied: Vanessa Teague

<h2 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
The Future of Cybercrime: What’s on the Horizon?

The trends point to a future where cyberattacks become even more
sophisticated, targeted, and frequent. Several key developments are likely
to shape this landscape:

<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
AI-Powered Attacks

Artificial intelligence (AI) is a double-edged sword. While it can enhance
cyber defenses, it’s also being weaponized by attackers. Expect to see
AI-driven phishing campaigns that are incredibly realistic and personalized,
making them harder to detect. AI can also automate vulnerability scanning
and exploit development, accelerating the pace of attacks.

<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
Ransomware Evolution

Ransomware isn’t going away. Instead, it’s evolving. We’re already seeing
“double extortion” tactics, where attackers not only encrypt data but also
threaten to release it publicly. Future ransomware attacks may target
critical infrastructure, with potentially devastating consequences. The
recent Qantas breach, where hackers threatened to release customer data if a
ransom wasn’t paid, is a stark example of this trend.

<figure
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_outdentDesktopijbiK Figure_figure__xLyBy Figure_docImageDSvk4″
data-print=”inline-media”
data-component=”Figure”
id=”106161846″
data-uri=”coremedia://imageproxy/106161846″

<img
alt=”Close up of a hand typing on a keyboard in a dark room”
class=”Image_image__5tFYM ContentImage_image__DQ_cq”
sizes=”100vw”
src=”https://live-production.wcms.abc-cdn.net.au/c6499cd148dcf327945d6d39dc52a9d1?impolicy=wcms_crop_resize&amp;cropH=2000&amp;cropW=3000&amp;xPos=0&amp;yPos=0&amp;width=862&amp;height=575”
loading=”lazy”
data-component=”Image”
data-lazy=”true”
/>

Vanessa Teague says companies should not pay ransoms to hackers as it
only incentivises them to steal again.

Pexels

Paying ransoms only fuels the problem, as Dr. Teague emphasizes: “Ransomware
is a highly organised market, the money they get from one attack is simply
redeployed to improve their performance for subsequent attacks.”

<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
Supply Chain Attacks

Attacks targeting the software supply chain are becoming increasingly common.
By compromising a single vendor, attackers can gain access to a vast network
of customers. This makes supply chain attacks particularly dangerous and
difficult to defend against.

<h2 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
Protecting Yourself in a Risky Digital World

While the threat landscape is evolving, individuals and organizations can
take steps to mitigate their risk. Dr. Teague stresses the importance of
proactive security measures.

“It’s unfortunate that [the government doesn’t] mention encrypting data,
because that would significantly help in mitigating the damage done by a
data breach,” she says. Encryption renders data unreadable to unauthorized
parties, even if a breach occurs.

Updating the Privacy Act to hold organizations accountable for data security
is also crucial. Furthermore, minimizing data collection and retention
reduces the potential impact of a breach. As Privacy Commissioner Carly
Kind notes, “Lengthy data retention beyond what is reasonable continues to
be an aggravating factor in data breaches.”

On a personal level, adopting end-to-end encrypted communication tools
(Signal, iMessage, WhatsApp) and using privacy-focused browsers with ad
blockers can significantly enhance your digital security. Be mindful of the
data you share online and avoid providing unnecessary personal information.

<figure
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_outdentDesktopijbiK Figure_figure__xLyBy Figure_docImageDSvk4″
data-print=”inline-media”
data-component=”Figure”
id=”106120358″
data-uri=”coremedia://imageproxy/106120358″

<img
alt=”Carly Kind, a woman with brown hair smiles at camera.”
class=”Image_image__5tFYM ContentImage_image__DQ_cq”
sizes=”100vw”
src=”https://live-production.wcms.abc-cdn.net.au/a15050b8413de898854f7d8cc5781c3f?impolicy=wcms_crop_resize&amp;cropH=1426&amp;cropW=2139&amp;xPos=0&amp;yPos=217&amp;width=862&amp;height=575”
loading=”lazy”
data-component=”Image”
data-lazy=”true”
/>

Carly Kind says data breaches continue to be prevalent in our digital
age.

Supplied: OAIC

<aside
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_floatRightnfR_t RelatedCard_relatedCard4Im5s interactive_focusContextyRhc_ interactive_defaultsAKxUU interactive_hoverContext__LDUDX interactive_defaults__AKxUU”
data-component=”RelatedCard”
data-uri=”coremedia://article/106157228″

<a
href=”https://www.abc.net.au/news/2025-11-12/genea-ivf-data-breach-fallout-ongoing-cyber-concerns-raised/105984716”
data-component=”FullBleedLink”
class=”RelatedCard_linkrsgR9 FullBleedLink_rootlTw_U interactive_focusContextyRhc_ interactive_defaults__AKxUU FullBleedLink_showVisitedg3Xvz”

<h3
class=”Typography_basesj2RP RelatedCard_headingS_nm2 Typography_sizeMobile18eJCIB Typography_lineHeightMobile24crkfh Typography_boldFqafP Typography_serif__qU2V5 Typography_colourInheritdfnUx”
data-component=”Typography”

Genea patients push for justice

Patients of fertility giant Genea want the company held to account for a
data breach earlier this year, amid concerns that some of its IT systems
continue to fall short of best practice.


<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
FAQ: Staying Safe Online

**Q: What is multi-factor authentication (MFA)?**
A: MFA adds an extra layer of security by requiring a second verification
method (like a code sent to your phone) in addition to your password.

**Q: Should I use the same password for all my accounts?**
A: Absolutely not! Use strong, unique passwords for each account. A password
manager can help you generate and store them securely.

**Q: What should I do if I suspect I’ve been hacked?**
A: Immediately change your passwords, contact your bank and any affected
service providers, and report the incident to relevant authorities.

**Q: Is a VPN (Virtual Private Network) helpful?**
A: A VPN can encrypt your internet traffic and mask your IP address, adding
a layer of privacy, especially on public Wi-Fi networks.

The cyber security landscape is constantly shifting. Staying informed,
adopting proactive security measures, and demanding greater accountability
from organizations are essential steps in protecting yourself and your data in
the years to come.

December 27, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • Morocco Hosts Conference in Stockholm on Multilateralism, a Changing World Order

    April 24, 2026
  • Developer Wakes Up to $18,000 Google Cloud Bill Due to Exposed API Key

    April 24, 2026
  • CFTC Sues New York Over Prediction Markets Amid Ongoing Efforts to Preserve Jurisdiction

    April 24, 2026
  • World’s Richest Countries: Norway Tops New Global Prosperity Index

    April 24, 2026
  • Beyond GDP: The World’s Richest Countries by Prosperity Index

    April 24, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World