You can search for keywords to find pages that can help you e.g. scam
Contact us
Portal login
back to main menu
Learn about who we are and what we do.
Interactive tools and advice to boost your online safety.
Advice and information about how to protect yourself online.
Common online security risks and advice on what you can do to protect yourself.
Respond to cyber threats and take steps to protect yourself from further harm.
Resources for business and government agencies on cyber security.
Displaying search results for Displaying 1 - 30 of 667 results.
Cyber Security Awareness Month 2025
Sep 30, 2024 - Take action to protect your networks and digital infrastructure now and into the future.
Annual Cyber Threat Report 2024-2025 Reports and statistics
Oct 14, 2025 - ASD’s Annual Cyber Threat Report 2024–25 provides an overview of the key cyber threats impacting Australia, how ASD’s ACSC is responding and cyber security advice for Australian individuals, organisations and government to protect themselves online.
Artificial intelligence and machine learning pose new cyber security risks to supply chains News
Oct 16, 2025 - New publication for organisations on the importance of AI and ML supply chain security.
Australian Signals Directorate releases the Annual Cyber Threat Report 2024-25 News
Oct 14, 2025 - The Annual Cyber Threat Report 2024-25 provides an overview of the key cyber threats impacting Australia, how ASD's ACSC is responding and cyber security advice for Australian individuals, organisations and government to protect themselves online.
Guidelines for cybersecurity incidents Advice
Sep 4, 2025 - This chapter of the Information security manual (ISM) provides guidance on cybersecurity incidents.
Cybersecurity guidelines
Jun 13, 2024 - Practical guidance on how an organisation can protect their information technology and operational technology systems, applications and data from cyberthreats.
Cybersecurity principles Advice
Sep 4, 2025 - Follow the Information security manual (ISM)'s cybersecurity principles to protect information technology and operational technology systems, applications and data from cyberthreats.
Cybersecurity terminology Advice
Sep 4, 2025 - This chapter of the Information security manual (ISM) provides guidance on cybersecurity terminology.
Guidelines for cybersecurity roles Advice
Sep 4, 2025 - This chapter of the Information security manual (ISM) provides guidance on cybersecurity roles.
Guidelines for cybersecurity documentation Advice
Sep 4, 2025 - This chapter of the Information security manual (ISM) provides guidance on cybersecurity documentation.
Further cyber sanctions in response to Medibank Private cyberattack News
Feb 12, 2025 - Today Australia has imposed targeted financial and travel sanctions on a cyber infrastructure entity – ZServers – and five of its Russian employees for their roles in providing infrastructure to host and disseminate data stolen from Medibank Private in 2022.
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity Publication
Sep 4, 2025 - This guidance, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners, presents a shared vision of Software Bill of Materials (SBOM) and the value that increased software component and supply chain transparency can offer to the global community.
Cybercriminals scanning Australian entities for serious cyber vulnerability News
Dec 21, 2021 - Australians must urgently patch applications and software products as malicious cyber adversaries conduct thousands of scans in search of the vulnerability related to the critical Log4j software flaw.
Cyber sanction imposed on Russian cybercriminal for 2022 Medibank Private compromise News
Jan 23, 2024 - Today Australia has imposed a cyber sanction under the Autonomous Sanctions Act 2011 on Russian national Aleksandr Ermakov for his role in the compromise of Medibank Private in 2022. This is the first time a sanction has been imposed under the Act.
Take action this Cyber Security Awareness Month News
Oct 1, 2025 - Don’t get caught missing in action this Cyber Security Awareness Month.
Joint Cybersecurity Guide to increase cyber security of products globally News
Apr 14, 2023 - This guide provides a roadmap for technology manufacturers to ensure security of their products.
Cyber security for charities and not-for-profits Guidance
Sep 30, 2025 - How to avoid common cyber threats and protect your mission .
Join the Cyber Threat Intelligence Sharing service through Sentinel or Splunk Enterprise Security News
Oct 2, 2025 - The Australian Signals Directorate’s (ASD’s) Cyber Threat Intelligence Sharing (CTIS) is a two-way sharing platform that enables government and industry partners to receive and share information about malicious cyber activity at machine speed.
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators Publication
Aug 14, 2025 - This guidance outlines how OT owners and operators can create and maintain an asset inventory and OT taxonomy, to protect their most vital assets. It includes steps for defining scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data, and implementing asset life cycle management.
People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection joint cybersecurity advisory News
May 25, 2023 - Today we released a joint advisory with international partners on a recently discovered cluster of activity associated with a People’s Republic of China (PRC) state-sponsored cyber actor.
Security configuration guide: Viasat Mobile Dynamic Defense Publication
Oct 6, 2021 - ASD has developed this guide to assist Australian’s to understand risks when deploying Viasat MDD devices and the security requirements that need to be met to allow them to handle classified data.
Cyber security incident response
Apr 12, 2024 - This page lists publications on preparing for and responding to cyber security incidents.
Mitigating cyber security incidents
Aug 30, 2023 - The Australian Signals Directorate has developed prioritised mitigation strategies to help organisations mitigate cyber security incidents caused by various cyber threats.
Personal cyber security guides
Oct 1, 2021 - This page includes a series of cyber security guides that you can use to protect yourself and be cyber secure.
Managing cyber supply chains
Dec 3, 2020 - This page lists publications on cyber supply chain risk management.
Cyber security for business leaders
May 16, 2024 - This page lists publications on governance strategies that can be applied to improve cybersecurity within organisations.
Strategies to mitigate cybersecurity incidents: Mitigation details Publication
Feb 1, 2017 - The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies to help cybersecurity professionals in all organisations mitigate cybersecurity incidents caused by various cyberthreats. This guidance addresses targeted cyber intrusions (i.e. those executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious insiders, ‘business email compromise’, and industrial control systems.
Shifting the balance of cybersecurity risk Publication
Oct 17, 2023 - The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and the following international partners provide the recommendations in this guide as a roadmap for technology manufacturers to ensure security of their products.
ASD's ACSC urges victims to report cybercrimes News
Jul 17, 2023 - The Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) is urging all Australians to report cybercrimes immediately to ReportCyber amid the growing number of cybercrimes impacting Australians.
Strategies to mitigate cybersecurity incidents Publication
Feb 1, 2017 - The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies to help organisations mitigate cybersecurity incidents caused by various cyberthreats. This guidance addresses targeted cyber intrusions (i.e. those executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious insiders, ‘business email compromise’, and industrial control systems.