How Microsoft Aligns and Matures Essential 8 Mitigation Strategies
The Essential Eight are a baseline set of security controls that been recommended by The Australian Cyber Security Centre to help mitigate malicious cyber activity for organisations. To help with the implementation of these controls, the Australian Signals Directorate (ASD) has defined an Essential Eight maturity model, detailing the different levels of maturity to help […]
What is the Essential 8 and Why Should You be Interested?
What is the Essential 8? The Essential Eight is a baseline set of mitigation strategies that have been developed by the Australian Cyber Security Centre (ACSC). These mitigation strategies have been developed by the ACSC to help organisations protect themselves against various cyber threats regardless of their industry. 1. Application Control 2. Application Patching 3. […]
30% Rise In Ransomware Attacks Over Holiday Season
Report reveals 30% rise in ransomware attacks during the holidays – Cyber Security Connect Darktrace has reported that its security researchers discovered a 30% increase in the average number of attempted ransomware attacks globally over the holiday season in every consecutive year from 2018 to 2020 compared, with the monthly average. According to Justin Fier, […]
SA Government Hit By Cyber Attack
SA government hit by cyber attack – Cyber Security Connect South Australian Premier Steven Marshall is among 38,000-80,000 employees with personal information exposed as a result of a ransomware attack on external payroll software provider Frontier Software. According to the SA government, the personal information includes names, dates of birth, tax file numbers, home addresses, bank account details, remuneration and superannuation contributions. The breach is currently under investigation, with the government offering support to affected employees. As organisations become more reliant on SaaS products, it’s crucial when making purchasing decisions to consider potential SaaS providers’ security posture and practices, as it can and will have direct impacts on their customers when they suffer outages due to cyber incidents. Attackers are increasingly using an organisation’s supply chain partners to gain access to confidential and sensitive information, particularly if they identify a weak link. As such, it’s imperative organisations are working closely with their supply chains to understand the security of businesses they collaborate with and work together to address vulnerabilities. For over ten years, Acurus has been trusted by Australia’s largest household brands, including Energy Australia, Officeworks, Bakers Delight, […]
Zoho: Patch new ManageEngine bug exploited in attacks
Zoho: Patch new ManageEngine bug exploited in attacks ASAP (bleepingcomputer.com) Business software provider Zoho urged customers today to update their Desktop Central and Desktop Central MSP installation to the latest available version. Zoho’s ManageEngine Desktop Central is a management platform that helps admins deploy patches and software automatically over the network and troubleshoot them remotely. […]
Do You Know and Trust Your Pentesters?
Hacking Gang Creates Fake Firm To Hire Pentesters For Ransomware Attacks Hacking gang creates fake firm to hire pentesters for ransomware attacks (bleepingcomputer.com) Hacking groups are now attempting to join the highly profitable ransomware space by creating fake cybersecurity companies that conduct network attacks under the guise of pentesting. As ransomware has become a profitable […]