Apache Log4j CVE-2021-44228 Log4Shell Vulnerability

UPDATE 1: 16/12/2021 - Added new vulnerability information and update from Sophos MTR Team. On December 9 2021, a severe remote code vulnerability was revealed in Apache’s Log4J , a very common logging system used by developers of web and server applications based on...

Steps to successfully manage a data breach

What you need to do when a data breach occurs When people hear the words “data breach” they often think “cyber security attack”. But the truth is that a data breach can take place through a multitude of different ways. While the Australian government...

How malicious actors are using automation

Increasingly used within businesses across all industries, automation helps minimise human input during basic and repetitive tasks. The goal of automation is to simplify and streamline processes and tasks in your workplace. It can be used to achieve smoother workflows and increase productivity. By...

The future of cybersecurity automation

In this digital age, cyberattacks are growing more sophisticated and slyer every day. Malicious actors use new technologies to implement their offensive strategies, and you need to keep up to remain ahead of these cyberthreats.An estimated 30,000 websites are hacked every day around the...

What the ACSC cybercrime report means for your business

What the ACSC cybercrime report means for your business The numbers have been tallied and the final results are in - cybercrime is on the rise, and every business and individual should be concerned.The Australian Cyber Security Centre (ACSC) have just released their Annual...

Better Cyber Security with Application Whitelisting

Cyberattack threats are on the rise and can cause serious, long-lasting damage to your business and operations. The AV-TEST Institute has already registered over 1.2 billion malware threats this year, with the numbers climbing rapidly every day.Application whitelisting (AWL) is one of the most...

Essential Eight cyber security strategies affecting Australian businesses

The Australian Cyber Security Centre (ACSC) has released the updated Essential Eight strategies that apply to all Australian businesses. They have been recently revised due to an increase in cyber-attacks, targeting small and big business. The updating of the Essential Eight was achieved in consultation...

Response to Kaseya VSA Security Incident

Kaseya VSA is an IT Management tool, used by Managed Service Providers to provide support to their customers. At approximately 2am Saturday the 3rd of July 2021, a sophisticated cyber-attack began against the Kaseya VSA software platform. This attack was designed to infect all computers...

Scott Morrison’s Cyber Attack News – What Do You Need To Do?

We wanted to provide some information to our clients about the announcement from Prime Minister Scott Morrison on Friday and the associated advisory from the Australian Cyber Security Centre relating to Cyber Security and recent attacks.  While the press release itself did not have a lot of substance, the advisory...

Are You Keeping Your Website Up To Date?

Over the past few weeks, we have seen an increase in attacks being targeted against websites. These attacks have all had one thing in common. They are attacking components of WordPress, a very popular Content Management System (CMS) used for creating websites that are...