Latest threat advice


The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What is ransomware? Ransomware is a type of malware that denies access to files … read more

Secondary targeting

Cyber adversaries will target the weakest link. If they are trying to target a network but it has strong cyber security, they will move to what’s called secondary targeting. In secondary targeting, the adversary will try to compromise other networks that … read more

New US Malware Report on state-sponsored actors

The US Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have released a new report, covering technical details on the tools and infrastructure used by North Korean state-sponsored cyber actors. This is the latest in a series … read more

Vulnerability in the Drupal content management system

The ACSC has become aware of a critical vulnerability in the Drupal content management system. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. Drupal assesses … read more

Routers targeted: Cisco Smart Install feature continues to be targeted by Russian state-sponsored …

Russian state-sponsored actors are responsible for activity targeting Cisco devices using the Smart Install feature worldwide, including Australia. Cisco has published the actions needed to secure the Smart Install feature in, Action Required to Secure the … read more

Processor vulnerabilities (Meltdown/Spectre)

29 January 2018 Intel has confirmed that the microcode updates designed to mitigate Spectre variant 2 (CVE-2017-5715: Branch Target Injection) have introduced an increased risk of system instability, data loss and corruption. Intel has released an advisory … read more