All archived alerts and advisories Title TypeAdvisoryAlert StatusCRITICALHIGHMEDIUMLOW AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 29 Jan 2020 Alert rating: High Processors can be exploited by Meltdown and Spectre vulnerabilities Security researchers have developed methods involving speculative execution to read kernel memory from user space on a variety of processors from a range of vendors produced in the last decade. These methods have been referred to as Meltdown and Spectre. Audience focus: Organisations & Critical Infrastructure Government 29 Jan 2020 Advisory Revised patch released to disable mitigation against Spectre variant 2 Intel has confirmed that the microcode updates designed to mitigate Spectre variant 2 (CVE-2017-5715: Branch Target Injection) have introduced an increased risk of system instability, data loss and corruption. Audience focus: Organisations & Critical Infrastructure Government 15 Jan 2020 Alert rating: Critical 2020-002: Critical vulnerabilities for Microsoft Windows On 15 January 2020 (AEDT), Microsoft released security patches for three critical and one important vulnerabilities in the Microsoft Remote Desktop Client, Remote Desktop Gateway and the Windows operating system. The ACSC recommends that users of these products apply patches urgently to prevent malicious actors from using these vulnerabilities to compromise your network. Audience focus: Individuals & families Small & medium businesses Organisations & Critical Infrastructure Government 15 Jan 2020 Advisory 2020-002: Critical Vulnerabilities for Microsoft Windows, Patch Urgently If you or your organisation uses any of the affected products, the ACSC recommends that you apply the patches urgently. Audience focus: Individuals & families Small & medium businesses Organisations & Critical Infrastructure Government 13 Jan 2020 Alert rating: Critical Active exploitation of critical vulnerability in Citrix Application Delivery Controller and Citrix Gateway The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) is aware of ongoing attempts to exploit a critical vulnerability in Citrix Application Delivery Controller (ADC) (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway) and Citrix SD-WAN WANOP. Audience focus: Small & medium businesses Organisations & Critical Infrastructure Government 13 Jan 2020 Advisory 2020-001-4: Remediation for critical vulnerability in Citrix Application Delivery Controller and Citrix Gateway On 19 January 2020, Citrix released patches for two versions of the Citrix Application Delivery Controller (ADC) and Citrix Gateway appliances. Citrix expects to have patches available across all supported versions of Citrix ADC, Citrix Gateway and Citrix SD-WAN WANOP before the end of January 2020. Audience focus: Small & medium businesses Organisations & Critical Infrastructure Government Pagination Previous page ‹‹ Page 22 Next page ›› Alerts and Advisories View our recent alerts and advisories Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary