Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Use this classification when it is a copied/external piece of content or referral

IRAP logo

Information Security Registered Assessors Program (IRAP)

Jul 1, 2018 - The Information Security Registered Assessors Program (IRAP) ensures government agencies can access high-quality information and communications technology (ICT) assessment services.

End of Support for Microsoft Windows Server 2008 and Windows Server 2008 R2

Nov 13, 2019 - On 14 January 2020, Microsoft will end support for Microsoft Windows Server 2008 and Windows Server 2008 R2. After this date, organisations will no longer receive patches for security vulnerabilities identified in these products. Subsequently, adversaries may use these unpatched security vulnerabilities to target Microsoft Windows Server 2008 and Windows Server 2008 R2 servers, thereby increasing the likelihood of a successful targeted cyber intrusion.
Check Scam Message Artwork

Advisory 2019-131a: Emotet malware campaign

Nov 8, 2019 - Overview The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) has observed an ongoing and widespread campaign of malicious emails designed to spread Emotet across a variety of sectors in the Australian economy, including critical infrastructure providers and government agencies. Emotet provides an attacker with a foothold in a network from which additional attacks can be performed, often leading to further compromise through the deployment of ransomware.

Malicious Email Mitigation Strategies

Nov 8, 2019 - Socially engineered emails containing malicious attachments and embedded links are routinely used in targeted cyber intrusions against organisations. This document has been developed to provide mitigation strategies for the security risks posed by these malicious emails.

ISM Archive

Nov 6, 2019 - The Australian Cyber Security Centre within the Australian Signals Directorate produces the Australian Government Information Security Manual (ISM). The purpose of the ISM is to outline a cyber security framework that organisations can apply, using their risk management framework, to protect their information and systems from cyber threats.