Acknowledgement of Country We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia’s First Peoples’ enduring contribution to Australia’s national security.
US Army tailoring Pacific commands for Multi-Domain force
A U.S. HIMARS, seen here being fired by U.S. soldiers during the Balikatan military exercise in Rizal, Philippines, May 2, 2024. (Cpl. Kyle Chan/Marine Corps) The U.S. Army in the Pacific has begun working through how it will build two Multi-Domain Commands in the theater to oversee and direct the service’s Multi-Domain Task Force units
Scattered Spider hackers shift focus to aviation, transportation firms
Hackers associated with “Scattered Spider” tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors These threat actors have employed a sector-by-sector approach, initially targeting retail companies, such as M&S and Co-op, in the United Kingdom and the United States and subsequently shifting their focus to insurance companies.
Advice, guidance and publications | Cyber.gov.au
Acknowledgement of Country We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia’s First Peoples’ enduring contribution to Australia’s national security.
Army seeks $197 billion FY26 budget with transformation plan at center
U.S. Army Staff Sgt. Stetson Manuel assembles the Ghost-X drone during the human-machine integration experiment for Project Convergence in Fort Irwin, California, on March 11, 2024. (Staff Sgt. LaShic Patterson/U.S. Army) As the U.S. Army attempts one of the biggest reorganizations in recent decades, it will have to do it within the confines of a
Brother printer bug in 689 models exposes default admin passwords
A total of 689 printer models from Brother, along with 53 other models from Fujifilm, Toshiba, and Konica Minolta, come with a default administrator password that remote attackers can generate. Even worse, there is no way to fix the flaw via firmware in existing printers. The flaw, tracked under CVE-2024-51978, is part of a set
Alerts and advisories | Cyber.gov.au
09 Apr 2025 Advisory BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors This advisory is jointly produced by government agencies from the UK, Australia, Canada, Germany, New Zealand, and the US and is supported by members of the NCSC’s Cyber League. Its purpose is to raise awareness about the
Tech execs enlist in Army Reserve for new innovation detachment
Soldiers take part in a human-machine integration demonstration at Fort Irwin, California, March 2024. (Spc. Samarion Hicks/U.S. Army) Four Silicon Valley technology executives from major companies are joining the U.S Army Reserve as officers to inject the speed and expertise of commercial technology development into military innovation through the newly established Detachment 201, an Executive
British hacker ‘IntelBroker’ charged with $25M in cybercrime damages
A British national known online as “IntelBroker” has been charged by the U.S. for stealing and selling sensitive data from victims worldwide, causing an estimated $25 million in damages. The indictment, revealed today by the U.S. Attorney’s Office for the Southern District of New York, accuses Kai West, a 25-year-old British man, of using the handle
Exploitation of existing Fortinet Vulnerabilities
This alert is relevant to Australian organisations who utilise Fortinet products. This alert is intended to be understood by technical users. Customers are encouraged to update their devices and investigate for potential compromise. Background / What has happened? Fortinet has released information regarding their observation of active exploitation of previously known vulnerabilities affecting Fortinet devices