
Welcome to the latest issue of the Australian Cyber Security Magazine. 2018 has been an interesting year so far. Australia…

Xbash has ransomware and coinmining capabilities. It also has self-propagating capabilities (meaning it has worm-like characteristics similar to WannaCry or…



Recent research by Palo Alto Networks Unit 42 Email Link Analysis (ELINK) has revealed that between April – June 2018,…


“It’s like watching a slow-motion governance train wreck.” Peter Coroneos, co-author According to the authors of the just published Cyber…


Cyberattackers are expanding their attack vectors to steal money, gain access to corporate and employee data Mimecast has announced the availability…


Linux.Mirai variants continue to evolve with better build systems to support the infection of multiple platforms. It’s safe to say…


We are excited to announce publication of the draft National Institute of Standards and Technology (NIST) Special Publication 1800-17: Multifactor Authentication for…


Bitdefender Investigates Advanced Cyberattacks on Financial Institutions, Warns That Hackers Target Eastern European and Russian Banks Bitdefender has recently investigated…


Cybercriminals are targeting mobile phone users by tricking them into downloading fake online banking apps. Mobile users who mistakenly download…


Overview The second quarter of 2018 saw a continuation of trends we observed in the first quarter — increasingly diverse…