The Australian Security Intelligence Organisation (ASIO) has released its Annual Threat Assessment for 2024. Threats to Australia’s national security.
Continue ReadingAdvisories
Advanced Persistent Threats 2023
The Cisco Talos Intelligence Group responding to the most sophisticated and persistent cyber threats, commonly known as Advanced Persistent Threats.
Continue ReadingThreat Research Juniper Networks
Threat Research Official Juniper Networks Cyber Threat Insights and expertise.
Continue ReadingThreat Labs Netskope
Threat Labs Cyber Threat Research and Cyber Threat Intelligence.
Continue ReadingSophos 2023 Threat Report
Sophos 2023 Threat Report Criminal marketplaces such as Genesis enable entry-level cybercriminals to purchase malware and sell stolen credentials.
Continue ReadingAll CISA Advisories
Cybersecurity and Infrastructure Security Agency (CISA) All Advisories.
Continue ReadingCyber Security Advisories
The latest MS-ISAC cyber security advisories. Feed provided by Center for Internet Security.
Continue ReadingCyber Security Forecast 2023
Cyber Security Forecast 2023 with Sandra Joyce, Mandiant Head of Global Intelligence.
Continue ReadingMicrosoft Digital Defense Report 2022
Microsoft Digital Defense Report presents data and insights about the current state of cybercrime, nation state threats, cyber influence operations, and more.
Continue ReadingLandscape for Ransomware Attacks
This report aims to bring new insights into the reality of ransomware incidents through mapping and studying ransomware incidents from May 2021 to June 2022.
Continue ReadingACSC Information Security Manual
The Australian Cyber Security Centre (ACSC) produces the Information Security Manual (ISM).
Continue ReadingGov Cyber Security Advisor
Telstra CEO Andy Penn, acting as chair of the government’s cyber security industry advisory committee, a speech to the National Press Club in Canberra.
Continue ReadingAustralia’s Cyber Security
The cyberactivity involved in the Russia-Ukraine conflict shows the need for Australia to bolster its own defensive and offensive cyber security capabilities.
Continue Reading