Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Latest threat advice

Processor vulnerabilities (Meltdown/Spectre)

Jan 29, 2018 - Security researchers have uncovered widespread critical vulnerabilities affecting modern processors

ACSC Threat Report 2017

Oct 15, 2017 - This is the third Australian Cyber Security Centre (ACSC) Threat Report. It continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the Centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained. For the first time, this year’s Threat Report also includes insights into how the ACSC works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.

ACSC Threat Report 2016

Oct 15, 2016 - This is the second Australian Cyber Security Centre (ACSC) Threat Report. It continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the Centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained. But we at the ACSC are not just focused on the problem. Importantly, this document also contains mitigation and remediation advice to assist organisations to prevent, and respond to, cyber threats.

Web Shells - Threat Awareness and Guidance

Nov 1, 2015 - Web shells can be used to leverage unauthorised access and can lead to wider network compromise. This advisory outlines the threat and provides prevention, detection and mitigation strategies for administrators of web servers that have active content languages installed.
Evaluation

ACSC Threat Report 2015

Jul 15, 2015 - This report describes the range of cyber adversaries targeting Australian networks, explains their motivations, the malicious activities they are conducting and their impact, and provides specific examples of activity targeting Australian networks during 2014. It also offers mitigation advice on how organisations can defend against these activities.