Skip to main content
Report a cybercrime, cyber security incident or vulnerability.
Report

What are you looking for?

You can search for keywords to find pages that can help you e.g. scam

Report

Contact us

Portal login

  • About us

    About us

    Learn about who we are and what we do.

    About us
    • About ASD's ACSC
      • Who we are
      • Alerts and advisories
      • News
      • Reports and statistics
      • Contact us
  • Learn the basics

    Learn the basics

    Interactive tools and advice to boost your online safety.

    Learn cyber security Sign up for alerts
    • Explore the basics
      • Recognise and report scams
      • Set secure passphrases
      • Set up and perform regular backups
      • Turn on multi-factor authentication
      • Update your devices
      • Watch out for threats
      • Small business
      • Seniors
    • View resources
      • Glossary
      • Quiz library
      • Resources library
      • Translated Information
  • Protect yourself

    Protect yourself

    Advice and information about how to protect yourself online.

    Protect yourself Easy steps to secure yourself online Cyber health check tool Sign up for alerts
    • Securing your accounts
      • Multi-factor authentication
      • Passphrases
      • Passkeys
    • Securing your devices
      • How to secure your devices
      • How to back up your files and devices
      • How to update your device and software
    • Securing your email
      • Email security
    • Staying secure online
      • Connecting with others online
      • Protect yourself from scams
      • Online shopping
      • Connecting to public Wi-Fi and hotspots
      • Secure your Wi-Fi and router
      • Cloud shared responsibility model: Guidance for individuals and small and medium businesses
      • Cyber security for charities and not-for-profits
    • Resources to protect yourself
      • Protecting your family
      • Personal cyber security guides
  • Threats

    Threats

    Common online security risks and advice on what you can do to protect yourself.

    Threats Report a cybercrime Sign up for alerts
    • Types of threats
      • Account compromise
      • Business email compromise
      • Cryptomining
      • Data breaches
      • Hacking
      • Identity theft
      • Information stealer
    • <notitle>
      • Malicious insiders
      • Malware
      • Phishing
      • Quishing
      • Ransomware
      • Scams
      • Social engineering
  • Report and recover

    Report and recover

    Respond to cyber threats and take steps to protect yourself from further harm.

    Report and recover Make a report Sign up for alerts
    • Report
      • Report a cybercrime, incident or vulnerability
      • Cybercrime - getting help
      • Single Reporting Portal
    • How we help during a cyber security incident
      • ASD’s role in cyber security: For legal practitioners
      • Supporting Australian organisations through a cyber security incident
      • Limited Use
    • Recover from
      • Account compromise
      • Business email compromise
      • Data breaches
      • Hacking
      • Identity theft
      • Malware
      • Ransomware
      • Scams
  • For business and government

    For business and government

    Resources for business and government agencies on cyber security.

    For business and government Become an ASD partner Critical infrastructure All publications Alerts and advisories Exercise in a Box
    • ASD's cyber security frameworks
      • Information security manual
      • Blueprint for Secure Cloud
      • Essential Eight
      • Gateway security guidance package
      • Mitigating cyber security incidents
      • Modern defensible architecture
      • Principles of operational technology cyber security
    • Secure design
      • Artificial intelligence
      • Operational technology environments
      • Quantum
      • Secure by Design
    • Protecting devices and systems
      • Assessment and evaluation programs
      • Cloud computing
      • Hardening systems and applications
      • Legacy IT management
      • Remote working and secure mobility
      • Securing edge devices
      • System administration
    • Detecting and responding to threats
      • Cyber security incident response
      • Detecting and mitigating Active Directory compromises
      • Event logging
      • Vulnerability planning
    • Small business cyber security
      • Small business hub
      • Protecting your staff
      • Securing customer personal data
    • Supplier cyber risk management
      • Managed service providers
      • Managing cyber supply chains
    • Protecting business leaders
      • Cyber security for business leaders
      • Security tips for social media and messaging apps
  • Contact us
  • Report a cybercrime or cyber security incident
  • Portal login
Australian Cyber
Security Hotline
1300 CYBER1 (1300 292 371)

Search

Filter results by

Content type

  • Advice and guidance
  • Alerts and advisories
  • News and media releases
  • Programs
  • Publications
  • Reports and statistics
  • Threats

Audience

  • Individuals & families
  • Small & medium businesses
  • Organisations & Critical Infrastructure
  • Government

Recommended pages

Watch out for threats
Ransomware

Search results

Displaying search results for
Displaying 681 - 700 of 707 results.

Applied filters
Clear all filters

/protect-yourself/securing-your-accounts/passphrases/creating-strong-passphrases

Creating Strong Passphrases   Guidance

Oct 6, 2021 - The longer your passphrase, the better. As adversaries can crack a short password with very little effort or time, you can increase the time and effort it takes by using a passphrase instead.

Individuals & families
Small & medium businesses
/about-us/advisories/advisory-2021-004-active-exploitation-forgerock-access-manager-openam-servers

Advisory 2021-004: Active exploitation of ForgeRock Access Manager / OpenAM servers   Advisory

Jul 9, 2021 - The Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) has identified targeting and compromise of Australian organisations with vulnerable internet-accessible servers running ForgeRock Access Manager (ForgeRock AM). ForgeRock AM was previously known as OpenAM. The ASD's ACSC has observed malicious actors exploiting the vulnerability in ForgeRock AM/OpenAM to gain initial access to networks in multiple organisations, and facilitate further access within these networks. On 7 July 2021 the ASD's ACSC alerted organisations that this vulnerability was being actively exploited. This ASD's ACSC advisory provides recommendations for securing ForgeRock AM against vulnerability CVE-2021-35464, and advice on identifying potential successful exploitation of this vulnerability.

Organisations & Critical Infrastructure
Government
/view-all-content/news/exercise-cyber-arrow

Exercise Cyber Arrow    News

Nov 14, 2025 - ASD’s delivers national cyber security exercise for the Energy, Communications, and Financial Services and Markets sectors

Organisations & Critical Infrastructure
Government
/protect-yourself/securing-your-devices/how-secure-your-devices/introduction-to-connected-vehicles

Introduction to connected vehicles   Guidance

Jun 30, 2025 - Connected vehicles (CVs) carry cyber security risks that vary depending on their level of connectivity. Learn about the risks before buying a CV and how to stay more secure when using these vehicles.

Individuals & families
/protect-yourself/staying-secure-online/shopping-and-banking-online/online-shopping/while-you-are-shopping

While you are shopping   Guidance

The best way to avoid being a victim of cybercrime is to be informed. It is really important to know how to secure your device and recognise a fake website or scammer.

Individuals & families
/about-us/view-all-content/news/building-a-cyber-secure-australia-a-fireside-chat

Building a cyber secure Australia: A fireside chat    News

Oct 29, 2025 - Hear from some of Australia’s top government cyber officials in a fireside chat as part of Cyber Security Awareness Month.

Organisations & Critical Infrastructure
Government
/about-us/view-all-content/news/building-stronger-supply-chains-through-collaboration-a-fireside-chat

Building stronger supply chains through collaboration: A fireside chat   News

Oct 29, 2025 - Find out how to take action on your supply chain and third party risk by watching our fireside chat with industry cyber professionals.

Small & medium businesses
Organisations & Critical Infrastructure
Government
/about-us/news/cyber-security-awareness-month-2022

Cyber Security Awareness Month 2022   News

Sep 30, 2022 - October is Cyber Security Awareness Month and this year the Australian Signals Directorate’s Australian Cyber Security Centre's (ASD’s ACSC) theme is Have you been hacked?

Individuals & families
Small & medium businesses
Organisations & Critical Infrastructure
/about-us/about-acsc/engagement-request

ASD/ACSC engagement request  

Jun 8, 2023 - Thank you for your interest in having ASD/ACSC attend or speak at your event. In order for us to identify the most appropriate staff member, we ask that you provide us with some information about your event, the audience and intended outcome of your engagement with ASD/ACSC. Please note we require 8 weeks’ notice to review your request.

Individuals & families
Small & medium businesses
Organisations & Critical Infrastructure
Government
/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-enterprise-mobility

Guidelines for enterprise mobility   Advice

Dec 4, 2025 - This chapter of the Information security manual (ISM) provides guidance on enterprise mobility.

Organisations & Critical Infrastructure
Government
/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-patch-operating-systems

Technical example: Patch operating systems   Publication

Dec 16, 2022 - Patching operating systems is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to their devices and sensitive information. Patches improve the security of operating systems by fixing known vulnerabilities.

Small & medium businesses
/business-government/asds-cyber-security-frameworks/ism/ism-feedback-form

ISM feedback form   Service

Mar 2, 2023 - ISM feedback and enquiries.

Organisations & Critical Infrastructure
Government
/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/irap-community-feedback-form

IRAP community feedback form  

Mar 1, 2021 - IRAP Community feedback form for the community to comment on a range of topics about the course

Small & medium businesses
Organisations & Critical Infrastructure
Government
/report-and-recover/report/report-a-vulnerability

Report a vulnerability   Service

Report vulnerabilities that are not publicly known, through the Australian Signals Directorate’s Australian Cyber Security Centre's (ASD’s ACSC) coordinated vulnerability disclosure service.

Organisations & Critical Infrastructure
Government
/about-us/alerts/new-domain-name-changes-could-leave-your-business-or-organisation-risk

New domain name changes could leave your business or organisation at risk   Alert

Mar 23, 2022 - The new domain name category, could leave your business or organisation open to fraudulent cyber activity. Register your .au domain name before it becomes available to the general public.

Small & medium businesses
Organisations & Critical Infrastructure
/about-us/alerts/sdbbot-targeting-health-sector

SDBBot targeting health sector   Alert

Nov 12, 2020 - The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has observed increased targeting activity against the Australian health sector by actors using the SDBBot Remote Access Tool (RAT).

Small & medium businesses
Organisations & Critical Infrastructure
Government
/about-us/alerts/netlogon-elevation-privilege-vulnerability-cve-2020-1472

Netlogon elevation of privilege vulnerability (CVE-2020-1472)   Alert

Sep 22, 2020 - The ACSC is aware of a recently disclosed critical vulnerability in Microsoft Active Directory Domain Controller systems that allows unauthenticated attackers to trivially access administrative credentials.

Small & medium businesses
Organisations & Critical Infrastructure
Government
/about-us/alerts/active-exploitation-vulnerable-mobileiron-products

Active exploitation of vulnerable MobileIron products   Alert

Sep 18, 2020 - The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) is aware of active exploitation of vulnerabilities in multiple MobileIron products by malicious cyber actors, including sophisticated state-based actors.

Small & medium businesses
Organisations & Critical Infrastructure
Government
/about-us/alerts/increasing-reports-mygov-related-sms-and-email-scams-targeting-australians

Increasing reports of myGov-related SMS and email scams targeting Australians   Alert

Jul 16, 2020 - Be on the lookout for myGov-related SMS and email scams asking you to verify your myGov details.

Individuals & families
Small & medium businesses
/about-us/alerts/processors-can-be-exploited-meltdown-and-spectre-vulnerabilities

Processors can be exploited by Meltdown and Spectre vulnerabilities   Alert

Jan 29, 2020 - Security researchers have developed methods involving speculative execution to read kernel memory from user space on a variety of processors from a range of vendors produced in the last decade. These methods have been referred to as Meltdown and Spectre.

Organisations & Critical Infrastructure
Government

Pagination

  • First page « First
  • Previous page ‹‹
  • …
  • Page 32
  • Page 33
  • Page 34
  • Current page 35
  • Page 36
  • Next page ››
  • Last page Last »
Report a cyber security incident for critical infrastructure
Get alerts on new threats Alert Service
Become an ASD Partner
Report a cybercrime or cyber security incident
Acknowledgement of Country Circle
Acknowledgement of Country

We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities.
We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Australian Cyber Security Hotline 1300 CYBER1 (1300 292 371)
  • Contact us
  • Glossary
  • View all content
  • Copyright
  • Privacy
  • Accessibility
  • Disclaimer
  • Careers
  • Social media terms of use

Popular pages

  • Essential Eight
  • Alerts and advisories
  • Information Security Manual
Authorised by the Australian Government, Canberra