Learn how understanding how stolen credentials, personal details, and even overshared social media content are weaponised, individuals as well as businesses can take a proactive position in reducing risk.
Over the past 18 months, Australians have been bombarded with headlines about major breaches—from Optus to Medibank to Qantas. While the immediate impact of these incidents is clear, the story doesn’t end when the breach is disclosed. Behind the scenes, a vast underground marketplace thrives on trading, packaging, and exploiting stolen data. This presentation explores what happens to personal and organisational information once it leaves the confines of legitimate systems and enters the Dark Web economy.
The discussion will also highlight how the blending of breached data with open-source information enables attackers to build highly personalised profiles. Unlike opportunistic scams, these targeted attacks are carefully crafted to exploit trust, context, and vulnerability. The rise of personalised phishing emails, scam calls, and social media outreach underscores the importance of understanding this evolving threat landscape.
Ultimately, the aim of this session is to cut through "breach fatigue" by reframing a familiar topic through a different lens—shifting the conversation from passive concern to proactive action.
Date: Thursday 23 October 2025
Time: 1–2pm
Location:
When you attend RMIT official events or activities you may be photographed or recorded. By attending the event, you agree to RMIT's Terms.
RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business - Artwork 'Sentient' by Hollie Johnson, Gunaikurnai and Monero Ngarigo.
More information