You can search for keywords to find pages that can help you e.g. scam
Contact us
Portal login
back to main menu
Learn about who we are and what we do.
Interactive tools and advice to boost your online safety.
Advice and information about how to protect yourself online.
Common online security risks and advice on what you can do to protect yourself.
Respond to cyber threats and take steps to protect yourself from further harm.
Resources for business and government agencies on cyber security.
Displaying results for Displaying 181 - 210 of 517 results.
Critical vulnerability in certain versions of Apache HTTP Server Alert
Oct 8, 2021 A vulnerability exists in Apache HTTP Server 2.4.49. A cyber actor could exploit this vulnerability to execute arbitrary code. Initial information also indicates that the vulnerability could also be used perform remote code execution under certain configurations. Affected Australian organisations should apply the available patch.
Using the Information Security Manual Advice
Sep 26, 2024 This chapter of the Information Security Manual (ISM) provides guidance on using the ISM.
Log4j: What Boards and Directors Need to Know Advisory
Jan 7, 2022 Log4j is a software library used as a building block found in a wide variety of Java applications. The Log4j vulnerability – otherwise known as Log4Shell – is trivial to exploit, and represents a significant business continuity risk. This publication outlines what Boards and Directors need to know in order to protect their businesses.
Joint cybersecurity advisory released on 2021's top routinely exploited vulnerabilities News
Apr 28, 2022 Malicious cyber actors are aggressively targeting newly-disclosed and dated critical software vulnerabilities against a broad range of targets, including public and private sector organisations worldwide.
Essential Eight Explained Publication
Nov 27, 2023 This publication provides an overview of the Essential Eight.
Phone and email scammers impersonating the ASD's ACSC Alert
Jan 19, 2022 The Australian government will NEVER phone you to request access to your computer, or request you to purchase cryptocurrencies or gift cards. If you receive a suspicious phone call, take the caller's details, hang up and contact the company they claim to represent via official communication channels listed on their website. Never call a number provided by the scammer.
Business resources
Apr 11, 2023 Protecting your business from cybercriminals is vital in keeping your people and systems secure. Learn how to protect your business from cyber threats
Strategies to Mitigate Cyber Security Incidents
Aug 30, 2023 The Australian Signals Directorate has developed prioritised mitigation strategies to help organisations mitigate cyber security incidents caused by various cyber threats.
Alerts and Advisories
Jan 30, 2023 Find the latest in cyber security alerts and advice
Advisory 2020-009: Recommendations to mitigate APT actors targeting health sector and COVID-19 essential services Advisory
May 8, 2020 The ACSC recommends that organisations in the health sector implement the following cyber security mitigations:
Hacking Threat
Jan 5, 2023 Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.
Security Configuration Guide – Viasat Mobile Dynamic Defense Publication
Oct 6, 2021 ASD has developed this guide to assist Australian’s to understand risks when deploying Viasat MDD devices and the security requirements that need to be met to allow them to handle classified data.
Australia joins US and UK to warn of 2021 Ransomware trends News
Feb 10, 2022 Ransomware continues to be a global threat, and cybercriminals using ransomware pose a significant risk to Australian organisations and households.
Gootkit Loader continues to be used on multiple Australian networks Advisory
Dec 23, 2022 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) continues to observe instances of Gootkit JavaScript (JS) Loaders on multiple Australian networks in 2022. Open source reporting also indicates continued Gootkit activity.
How to use the internet securely: A guide for seniors Guidance
Oct 1, 2021 Some basic cyber security practices that you can use to protect yourself when accessing the internet.
Risk Management of Enterprise Mobility (Including Bring Your Own Device) Publication
Oct 6, 2021 This publication has been developed to provide senior business representatives with a list of enterprise mobility considerations. These include business cases, regulatory obligations and legislation, available budget and personnel resources, and risk tolerance. Additionally, risk management controls are provided for cyber security practitioners.
People’s Republic of China (PRC) State-Sponsored Cyber Actor Living Off the Land to Evade Detection Alert
May 25, 2023 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC), in conjunction with the United States (US) National Security Agency (NSA) its international partners, has released a Cybersecurity Advisory regarding a PRC state-sponsored cyber actor conducting activity impacting US critical infrastructure (CI) sectors. Because of the potential risk to CI sectors outside the US, all organisations are encouraged to review the published Advisory and report any malicious activity to the ASD's ACSC.
Managing the Risks of Legacy IT: Practitioner Guidance Publication
Jun 12, 2024 This publication provides guidance for practitioners on managing the risks posed by legacy IT and outlines low-cost mitigations that organisations can draw upon.
Barracuda Email Security Gateway (ESG) malicious activity – additional Indicators of Compromise released Alert
Dec 25, 2023 Update: ASD's ACSC is aware of active exploitation of a third party library, Spreadsheet::ParseExcel, leading to potential Arbitrary Code Execution in Barracuda ESG appliances (CVE-2023-7101 and CVE-2023-7102).
Learn the basics
Aug 30, 2023 Interactive tools and advice to boost your security online.
Exchange server critical vulnerabilities Alert
Apr 15, 2021 On 2 March 2021 Microsoft released information regarding multiple exploits being used to compromise instances of Microsoft Exchange Server. Malicious actors are exploiting these vulnerabilities to compromise Microsoft Exchange servers exposed to the internet, enabling access to email accounts and to enable further compromise of the Exchange server and associated networks.
PRC State-Sponsored Cyber Activity Advisory
Mar 20, 2024 This fact sheet provides an overview for executive leaders on the urgent risk posed by People’s Republic of China (PRC) state-sponsored cyber actors known as "Volt Typhoon."
Critical Infrastructure
Jul 22, 2024 Technical advice and non-regulatory guidance for critical infrastructure.
SVR cyber actors adapt tactics for initial cloud access Advisory
Feb 27, 2024 How SVR-attributed actors are adapting to the move of government and corporations to cloud infrastructure.
The Case for Memory Safe Roadmaps Publication
Dec 7, 2023 This guidance provides manufacturers with steps to create memory safe roadmaps and implement changes to eliminate memory safety vulnerabilities from their products.
Hardening Microsoft Windows 10 and Windows 11 Workstations Publication
Jul 16, 2024 Workstations are often targeted by malicious actors using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 and Windows 11.
Cloud Assessment and Authorisation Publication
Jan 18, 2024 This publication is co-designed with industry to support the secure adoption of cloud services across government and industry.
Guidelines for Security Documentation Advice
Jun 13, 2024 This chapter of the Information Security Manual (ISM) provides guidance on security documentation.
ASD's ACSC social media community
Connect with us on Facebook, Twitter and YouTube, and find out how to subscribe to our RSS feeds.
Cybercriminals scanning Australian entities for serious cyber vulnerability News
Dec 21, 2021 Australians must urgently patch applications and software products as malicious cyber adversaries conduct thousands of scans in search of the vulnerability related to the critical Log4j software flaw.