CybergieneCybergiene
I am
The Framework

The ETHICS Digital Resiliency Framework

A holistic digital resiliency framework with six pillars addressing every dimension of cyber resilience. Created by Cybergiene, grounded in research, and built into every microapp.

E
T
H
I
C
S

Why a new framework?

Existing approaches to digital safety are fragmented. Awareness training exists in isolation, security tools don't educate, and none of them adapt to the individual. ETHICS unifies all six dimensions into a single, coherent model where each pillar reinforces the others.

Most importantly, ETHICS wraps everything in Resilience, the structural layer ensuring individuals and communities can absorb, recover, and continue in the face of cyber threats. It's about endurance as much as prevention.

📚
Efor

Education

Awareness is the foundation. Without understanding threats, people can't protect themselves. We make learning continuous, engaging, and tailored rather than a one-off compliance checkbox.

🔧
Tfor

Tools

Knowledge without tools is frustration. We give people practical, easy-to-use security solutions like QR scanners, password managers, and network monitors that work instantly.

🛡️
Hfor

Hygiene

Security is a habit, not a product. Like brushing your teeth, digital hygiene must become second nature. We track, nudge, and gamify daily security habits until they stick.

🔍
Ifor

Intelligence

You can't defend against what you don't know exists. We surface real-time threat intelligence tailored to your profile, your location, and your digital footprint.

🤝
Cfor

Community

Security is a team sport. From family safety plans to peer mentoring, we build shared responsibility because one person's weakness becomes everyone's vulnerability.

🔒
Sfor

Safety

Protection, response, and recovery. From fraud detection to incident response to keeping families safe online, Safety is the pillar that catches you when prevention fails.

ETHICS In Action

One password manager. All six pillars.

See how a single tool, the password manager, threads through every ETHICS pillar. This is what an integrated framework looks like in practice: each pillar reinforces the others, creating layered protection that fragmented approaches cannot match.

E
📚

Know the threat

Education

You learn that credential reuse is behind 61% of cyber incidents reported to the OAIC. Account compromise through weak or reused passwords is one of the 12 ACSC threat types.

61% of cyber incidents involve compromised credentials

OAIC NDB Report, Jul-Dec 2024

T
🔧

Get the tool

Tools

You install Mirai Vault, our built-in password manager. One tool that addresses account compromise, info-stealer malware, hacking, and data breach response across 4 of the 12 ACSC threat categories.

47% lower risk of identity theft for password manager users

Security.org Password Manager Report, 2024

H
🛡️

Build the habit

Hygiene

Having the tool isn't enough. You use it for every login. Unique generated passwords for every new account, migrating existing accounts, and never falling back to memorised passwords.

Only 50.7% of Australians use different passwords for secure accounts

AIC Cybercrime in Australia, 2024

I
🔍

Stay informed

Intelligence

YourDigitalThreat uses a graph database to connect your accounts to active breach data. When a breach hits a service you use, the graph traces the relationship: this breach, this credential, this account. You know exactly what to change and why.

15.3B+ breached accounts indexed across 916+ services

Have I Been Pwned, 2025

C
🤝

Share the knowledge

Community

You help your parents set up their password manager. You share a scam alert with your family group. Individual resilience becomes network resilience because one person's weak password is everyone's vulnerability.

24,000 people enrolled in community cyber programs

Cyber Wardens / InnovationAus, 2025

S
🔒

Respond when it happens

Safety

When a breach notification arrives, you know to reset the credential immediately, report to ReportCyber, contact IDCARE if identity data is involved, and check for follow-on attacks across linked accounts.

Australian orgs take 266 days to identify and contain a breach

IBM/Ponemon Cost of Data Breach, 2024

This is why ETHICS is different

Other frameworks stop at "use a password manager," which is just the Tools pillar. ETHICS ensures you understand why (Education), build the habit (Hygiene), stay alert when your credentials are breached (Intelligence), protect those around you (Community), and know what to do when something goes wrong (Safety). One tool, six pillars, complete protection.

Flagship MicroApps

ETHICS, delivered

Every MicroApp in the Cybergiene ecosystem maps to an ETHICS pillar. These three showcase how the framework becomes a product.

YourDigitalThreat

Intelligence pillar

Your personal threat graph, in real-time

YourDigitalThreat ties together your profile, your digital assets, active threats, and real-world context using a graph database. It connects your accounts, devices, and location to breach data, scam campaigns, and vulnerabilities so you see how threats actually relate to you, not a flat list of generic alerts.

How it works

  • Ingests your profile, accounts, devices, and digital footprint into a threat graph
  • Links your assets to breach databases (15.3B+ compromised accounts), active campaigns, and CVEs
  • Graph relationships surface why a threat matters to you: this breach exposed this password on this account
  • Tracks your risk posture over time as you close gaps across ETHICS pillars

Key figures

15.3B+

Breached accounts indexed

HIBP

<48hrs

Target response time

ETHICS Framework

53.3B

Identity records recaptured in 2024

SpyCloud 2025

SecQRty

Tools pillar

See where a QR code leads before you go there

Quishing (malicious QR codes) is one of the 12 ACSC threat categories. SecQRty scans any QR code and previews the destination URL before you visit it. No more blindly trusting a QR code stuck to a parking meter or restaurant table.

How it works

  • Scan any QR code with your camera
  • See the full destination URL before visiting
  • Automatic threat check against known malicious domains
  • One tap to proceed or block; you're always in control

Key figures

Quishing

ACSC threat #7 of 12

ACSC 2026

Safety News

Intelligence pillar

Threat news tailored to your world

Generic cybersecurity news is noise. Safety News filters the threat landscape through your profile (your age, location, whether you're a parent or carer, what industry you work in) and surfaces only what matters to you. All processed on-device, free from privacy concerns.

How it works

  • Curated from authoritative sources (ACSC, OAIC, industry feeds)
  • Filtered by your profile: location, age, parental status, interests
  • On-device processing so your profile never leaves your phone
  • Adaptive learning: the more you engage, the better it understands your needs

Key figures

84,700

Cybercrime reports in FY2024-25

ASD 2025

<13%

Victims who actually report

AIC 2024

The Problem

The vicious cycle

A self-reinforcing loop that keeps digital safety broken. No one acts because no one else has acted. Cybergiene breaks the cycle.

1/6

Cyber Has No Resources

60% of CISOs report insufficient budget

ISACA State of Cybersecurity 2024

Cybergiene makes security free, eliminating the budget barrier entirely

2/6

Not a Revenue Generator

Only 12% of boards view security as a business enabler

Gartner Board of Directors Survey 2023

ETHICS framework positions security as customer trust and a competitive advantage

3/6

Customers Don't Choose on Cyber

<5% of consumers consider cyber posture when choosing a bank

Accenture Global Banking Consumer Study 2024

Cybergiene creates a consumer-facing cyber health score, like NCAP for digital services

4/6

Consumers Have No Info

No standardised public-facing cyber health score exists

Cybergiene Horizon 2 Consultation 2025

Our platform makes security posture visible and comparable for the first time

5/6

No Data Ranking Institutions

Zero public comparison of major banks/insurers on security

Cybergiene Horizon 2 Consultation 2025

Building the first open ranking system for institutional cyber hygiene

6/6

Government Declined to Act

Horizon 2 acknowledged the gap but declined to mandate transparency

Dept. of Home Affairs, Horizon 2 Strategy 2025

If government won't lead, a social enterprise will. That's why Cybergiene exists

Cycle repeats
Threats

A decade of escalation

Threats evolve faster than awareness. Each year brings a new attack paradigm while most people's security knowledge remains stuck in the password era.

2015

Rise of Ransomware

CryptoLocker and its variants made ransomware a household term

2017

Nation-State Attacks

WannaCry and NotPetya caused billions in damage worldwide

2019

Supply Chain Compromise

Attackers shifted to targeting trusted software providers

2020

Remote Work Attack Surface

COVID-19 forced rapid digital transformation, exposing millions

2021

Critical Infrastructure

Colonial Pipeline showed physical infrastructure was vulnerable

2022

AI-Powered Attacks

Deepfakes and AI-generated phishing reached mainstream

2023

LLM Weaponisation

WormGPT and FraudGPT lowered the barrier for cybercrime

2024

Identity-First Attacks

MFA fatigue, SIM swapping, and session hijacking dominate

2025-26

Quantum Threat Horizon

NOW

"Harvest now, decrypt later": data stolen today becomes vulnerable tomorrow

Threats accelerate. Awareness doesn't.

ETHICS is designed for this reality: a framework that evolves with the threat landscape, not one that's frozen in a slide deck from 2019.

Research

Grounded in research

Working Paper

ETHICS: A Holistic Framework for Consumer Digital Safety

Kenny Zhong, Cybergiene Pty Ltd, 2026

This paper introduces the ETHICS Digital Resiliency Framework, a six-pillar model (Education, Tools, Hygiene, Intelligence, Community, Safety) wrapped in a Resilience layer. Unlike traditional cybersecurity frameworks that address technical controls in isolation, ETHICS unifies awareness, practical tools, daily habits, threat intelligence, community support, and active protection into a single, adaptive ecosystem where each pillar reinforces the others.

Coming Soon