Tool used by Russiaโs Federal Security Service The Australian Cyber Security Centre has released a Joint Cybersecurity Advisory with its international partners on the Snake implant. The Snake implant is a sophisticated cyber espionage tool designed and used by Center 16 of Russiaโs Federal Security Service for long-term intelligence collectionโฆ
Read MoreACSC
ACSC ransomware profile โ Royal
Royal ransomware is likely associated with Russian-speaking cybercrime actors Context: Royal is a ransomware variant first observed in September 2022, used by cybercriminals to conduct ransomware attacks against multiple sectors and organisations worldwide, including Australia. Once gaining access to a victimโs environment, cybercriminals use this ransomware for similar purposes to otherโฆ
Read MoreAn introduction to securing smart places
System failures in smart places could have significant consequences Introduction The ACSC has released a new publication An Introduction to Securing Smart Places to assist public and private organisations in securely implementing and sustaining smart place technology. The highly connected nature of our cities and townsโ public and private infrastructure creates efficienciesโฆ
Read MoreACSC participation in Asia Pacific Computer Emergency Response Team
Ransomware poses one of the most significant threats to Australian organisations The capability of leading economies in the Asia-Pacific region to respond to serious cyber security incidents has been tested through annual drills designed to lift cyber security cooperation and capability among members. The drills are organised by the Asiaโฆ
Read MoreExploitation of Microsoft Office vulnerability: Follina
Affected Australian organisations should take appropriate action. Background / What has happened? Microsoft has disclosed a remote code execution (RCE) vulnerability in the Microsoft Support Diagnostic Tool (MSDT). This vulnerability, dubbed โFollinaโ, can be exploited by an attacker sending a URL to a vulnerable machine. Successful exploitation allows an attackerโฆ
Read MoreMultiple vulnerabilities present in F5 products
F5 released a security advisory relating to multiple Critical and High rated CVEโs. Update Multiple Critical and High-risk vulnerabilities exist in certain versions of F5 products. As of 10 May 2022, the ACSC is aware of malicious cyber actors actively exploiting vulnerable versions of F5 products in Australia and globally.โฆ
Read MoreAPT cyber actors exploiting Microsoft Exchange and Fortinet vulnerabilities
Advisory issued by FBI, CISA, ACSC and NCSC. A joint cybersecurity advisory is the result of an analytic effort among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdomโs National Cyber Security Centre (NCSC) to highlightโฆ
Read MoreMalicious cyber actors are actively targeting Australians
Key cyber threats affecting Australia and provides vital advice on to protect businesses online. The Australian Cyber Security Centre (ACSC) has released its Annual Cyber Threat Report 2020โ21, highlighting the key cyber threats affecting Australian systems and networks, and uses strategic assessments, statistics, trends analysis, and case studies to describeโฆ
Read MoreAPCERT drill themed supply chain attack through spear-phishing
APAC countries come together to reflect on real-life cyber security incidents. The Asia Pacific Computer Emergency Response Team has successfully completed its annual drill to test the response capability of leading Computer Security Incident Response Teams (CSIRT) within the Asia Pacific economies. The theme of this yearโs APCERT Drill isโฆ
Read MoreGlobal cyber agencies share top routinely exploited vulnerabilities
Four of the most targeted vulnerabilities in 2020 involved remote work. The US Cybersecurity and Infrastructure Security Agency (CISA), Australian Cyber Security Centre (ACSC), United Kingdomโs National Cyber Security Centre (NCSC) and Federal Bureau of Investigation (FBI) released a joint cybersecurity advisory highlighting the top Common Vulnerabilities and Exposures (CVEs) routinelyโฆ
Read More