Latest News

Department of Homeland security has issued an emergency directive requiring all US agencies to operate with a .gov domain. AU Gov tends to follow US Gov directives in turn so potentially, this is something that may be incorporated into the ISM in future.

#DHS #AU #security #ISM

Adobe has recently released security updates to fix two critical vulnerabilities for Acrobat and Reader. The first vulnerability, identified as CVE-2018-16011, can lead to the execution of arbitrary code. The second vulnerability, identified as CVE-2018-19725, can result in privilege escalation.

As these vulnerabilities are public now, it is highly recommended that both Mac and Windows users install these updates. Click on the following link for further action:

ATO claims to have received more than 115,000 faxed documents in 2017-18. According to ‘The Age’, and ‘the Sydney Morning Herald ‘, many small Australian companies in the healthcare, finance and legal sector still use fax on a daily basis. The vulnerabilities in the fax machine protocols haven’t been updated since the 1980s and such extensive use of fax printers in Australia pose a huge problem.

At the recent DEF CON 26 hacker event in Las Vegas, two security researchers from Check Point demonstrated one such exploit - ‘Faxploit’. They showed that a hacker only needs a fax number to exploit these vulnerabilities. A specially coded colour jpeg can have any malware code, which when received by the fax printer, can easily be decoded and uploaded into the printer’s memory. The malware can then spread through the device and ultimately to the network that is connected to the fax-printer. 

One way to prevent Faxploit is via network segmentation. Companies can limit the data access to an attacker by breaking large networks into smaller ones, or by isolating fax machines in their own subnetworks.


Privasec's Cyber Security Advisor for APAC, Shamane Tan wrote an article about the Open Group FAIR framework. This framework provides a structured and community vetted approach to calculate the Return on Investment (ROI) on cybersecurity controls. Read the full article here.


Distributed Denial-of-Service (DDoS) attack is an attempt to disrupt the normal functioning of a network, server or a website by flooding it with internet traffic. During a DDoS attack, there is practically no time to react.

Therefore, it is crucial to have a plan before a DDoS attack strikes. The plan must properly document the network topology diagram for management of crucial assets during the attack and require the alerting of relevant stakeholders. A few other tricks for preparing for a DDoS attack include the use of sufficient bandwidth, infrastructure redundancy, DNS server redundancy and use of WAF (web application firewalls) for server protection.