Latest threat advice

Secondary targeting

Cyber adversaries will target the weakest link. If they are trying to target a network but it has strong cyber security, they will move to what’s called secondary targeting. In secondary targeting, the adversary will try to compromise other networks that … read more

New US Malware Report on state-sponsored actors

The US Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have released a new report, covering technical details on the tools and infrastructure used by North Korean state-sponsored cyber actors. This is the latest in a series … read more

Vulnerability in the Drupal content management system

The ACSC has become aware of a critical vulnerability in the Drupal content management system. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. Drupal assesses … read more

Protect your devices against VPNFilter malware

Australian users need to be aware of VPNFilter malware, which is known to affect networking equipment including Linksys, MikroTik, Netgear and TP-Link, as well as QNAP network-attached storage (NAS) devices. Once a malicious actor compromises a device using … read more

Routers targeted: Cisco Smart Install feature continues to be targeted by Russian state-sponsored …

Russian state-sponsored actors are responsible for activity targeting Cisco devices using the Smart Install feature worldwide, including Australia. Cisco has published the actions needed to secure the Smart Install feature in, Action Required to Secure the … read more

Processor vulnerabilities (Meltdown/Spectre)

29 January 2018 Intel has confirmed that the microcode updates designed to mitigate Spectre variant 2 (CVE-2017-5715: Branch Target Injection) have introduced an increased risk of system instability, data loss and corruption. Intel has released an advisory … read more