The ASD’s ACSC is aware that criminals are using Australia’s national cybercrime reporting channel and impersonating police to try to scam Australians out of funds from their cryptocurrency or seed wallets. Cybercriminals have illicitly obtained personal information—such as email addresses and phone numbers—and used this to submit false reports to Australia’s national cybercrime reporting tool
Don’t take BADCANDY from strangers – How your devices could be implanted and what to do about it
Overview BADCANDY Cyber actors are installing an implant dubbed ‘BADCANDY’ on Cisco IOS XE devices that are vulnerable to CVE-2023-20198. Variations of the BADCANDY implant have been observed since October 2023, with renewed activity notable throughout 2024 and 2025. BADCANDY is a low equity Lua-based web shell, and cyber actors have typically applied a non-persistent
Critical vulnerability in Microsoft Windows Server Update Service (WSUS)
This alert has been written primarily for, but is not limited to, business and government. This alert is intended for a technical audience. Background Microsoft has identified the following vulnerability in the Microsoft Windows Server Update Service: CVE-2025-59287: This vulnerability involves deserialisation of untrusted data in WSUS, which could enable an unauthenticated actor to achieve
Multiple high-severity vulnerabilities in F5 products and incident impacting F5
This alert is intended for network and infrastructure teams, SOC analysts, and system administrators managing F5 products. Background F5 have released an advisory regarding a cyber security incident that has affected certain F5 systems with recommendation on what customers can do to help protect themselves. In addition to this advisory, F5 has issued its October
News | Cyber.gov.au
Acknowledgement of Country We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia’s First Peoples’ enduring contribution to Australia’s national security.
Reports and statistics | Cyber.gov.au
Acknowledgement of Country We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia’s First Peoples’ enduring contribution to Australia’s national security.
Advice, guidance and publications | Cyber.gov.au
Acknowledgement of Country We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia’s First Peoples’ enduring contribution to Australia’s national security.
Critical vulnerability in Oracle E-Business Suite
This alert is intended for a technical audience. It has been written primarily for; but is not limited to, business and government. Background Oracle has identified the following vulnerability in Oracle E-Business Suite. CVE-2025-61882: This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username
Multiple vulnerabilities affecting Cisco ASA 5500-X Series devices
This alert has been written for technical IT teams and services supporting organisations. This alert contains a combination of simple and moderately complex technical advice, intended for business owners and technical IT support services. Background ASD’s ACSC is aware of targeting of multiple vulnerabilities within Australia impacting Cisco ASA 5500-X Series models, that are running
Ongoing targeting of online code repositories
This alert is relevant to all Australians and Australian organisations that maintain online code repositories and public software packages. Background The ASD’s ACSC is aware of increased targeting of online code repositories. Threat actors have been observed gaining access to online code repositories through: Phishing/Vishing Social Engineering Compromised credentials Compromised authentication tokens Infected software packages.
