All archived alerts and advisories Title TypeAdvisoryAlert StatusCRITICALHIGHMEDIUMLOW AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 25 Feb 2020 Advisory Recommendations to mitigate DDoS threats being made against Australian organisations The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) is aware of a number of Denial of Service (DoS) for ransom threats being made against Australian organisations, primarily in the banking and finance sector. Audience focus: Organisations & Critical Infrastructure Government 06 Feb 2020 Alert rating: High 2020-003: Mailto ransomware incidents The Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) is aware of recent ransomware incidents involving a ransomware tool known as ‘Mailto’ or ‘Kazakavkovkiz’. Mailto belongs to the KoKo ransomware family. Audience focus: Individuals & families Small & medium businesses Organisations & Critical Infrastructure Government 29 Jan 2020 Alert rating: High Processors can be exploited by Meltdown and Spectre vulnerabilities Security researchers have developed methods involving speculative execution to read kernel memory from user space on a variety of processors from a range of vendors produced in the last decade. These methods have been referred to as Meltdown and Spectre. Audience focus: Organisations & Critical Infrastructure Government 29 Jan 2020 Advisory Revised patch released to disable mitigation against Spectre variant 2 Intel has confirmed that the microcode updates designed to mitigate Spectre variant 2 (CVE-2017-5715: Branch Target Injection) have introduced an increased risk of system instability, data loss and corruption. Audience focus: Organisations & Critical Infrastructure Government 15 Jan 2020 Alert rating: Critical 2020-002: Critical vulnerabilities for Microsoft Windows On 15 January 2020 (AEDT), Microsoft released security patches for three critical and one important vulnerabilities in the Microsoft Remote Desktop Client, Remote Desktop Gateway and the Windows operating system. The ACSC recommends that users of these products apply patches urgently to prevent malicious actors from using these vulnerabilities to compromise your network. Audience focus: Individuals & families Small & medium businesses Organisations & Critical Infrastructure Government 15 Jan 2020 Advisory 2020-002: Critical Vulnerabilities for Microsoft Windows, Patch Urgently If you or your organisation uses any of the affected products, the ACSC recommends that you apply the patches urgently. Audience focus: Individuals & families Small & medium businesses Organisations & Critical Infrastructure Government Pagination Previous page ‹‹ Page 21 Next page ›› Alerts and Advisories View our recent alerts and advisories Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary