VoicePlus Blogs

underline-img
Iranian Government-Sponsored APT Cyber Actors

Iranian Government-Sponsored APT Cyber Actors

FBI and CISA have observed an Iranian government-sponsored APT group that are exploiting vulnerabilities to gain access to systems. The APT group has exploited the same Microsoft Exchange vulnerability in Australia.

Read More arrow-img
Critical vulnerability present in certain versions of Microsoft Excel

Critical vulnerability present in certain versions of Microsoft Excel

Microsoft has identified active exploitation of a vulnerability in Microsoft Excel. Affected Australian organisations should apply the available security update as soon as possible.

Read More arrow-img
Critical Vulnerability present in certain versions of Apple iOS and ipads

Critical Vulnerability present in certain versions of Apple iOS and ipads

A vulnerability has been identified in certain Apple products which could allow an actor to install malware or perform other actions on a vulnerable device.

Read More arrow-img
Critical Vulnerability in Certain Versions of Apache HTTP Server

Critical Vulnerability in Certain Versions of Apache HTTP Server

A vulnerability exists in Apache HTTP Server 2.4.49. A cyber actor could exploit this vulnerability to execute arbitrary code. Initial information also indicates that the vulnerability could also be used perform remote code execution under certain configurations. Affected Australian organisations should apply the available patch.

Read More arrow-img
ACSC - High Alert - Apple IOS, Macos and Safari

ACSC - High Alert - Apple IOS, Macos and Safari

Critical vulnerabilities present in certain versions of Apple iOS, macOS and Safari

Read More arrow-img
ACSC - Microsoft Azure Service - Critical Alert

ACSC - Microsoft Azure Service - Critical Alert

A remote code execution vulnerability exists in Open Management Infrastructure, a management agent used in certain Linux-based Microsoft Azure services. Exploitation of this vulnerability could allow a malicious actor to take control of the vulnerable host. Affected organisations should apply the available security update.

Read More arrow-img
2021-006: ACSC Ransomware Profile - Lockbit 2.0

2021-006: ACSC Ransomware Profile - Lockbit 2.0

ACSC has observed an increase in reporting of LockBit 2.0 ransomware incidents in Australia. The LockBit ransomware restricts access to corporate files and systems by encrypting them into a locked and unusable format. Victims receive instructions on how to engage with the offenders after encryption. LockBit affiliates have successfully deployed ransomware on corporate systems in a variety of countries and sectors, including Australia, where the ACSC is aware of numerous incidents since 2020. LockBit affiliates are known to implement the ‘double extortion’ technique by uploading stolen and sensitive victim information to their dark web site ‘LockBit 2.0’, and threatening to sell and/or release this information if their ransom demands are not met.

Read More arrow-img
Cybercriminals targeting construction companies to conduct email scams

Cybercriminals targeting construction companies to conduct email scams

Cybercriminals are targeting construction companies to conduct business email compromise scams. All parties to construction projects should be vigilant when emailing about invoices and bank details.

Read More arrow-img
ACSC - Security Update - Chrome Browser

ACSC - Security Update - Chrome Browser

Google released Chrome version 91.0.4472.114 for Windows, Mac, and Linux. The patch notes for this version can be viewed at Chrome Release Note.

Read More arrow-img
Critical vulnerability discovered in HTTP.SYS in Microsoft Windows

Critical vulnerability discovered in HTTP.SYS in Microsoft Windows

A remote code execution vulnerability could enable a malicious cyber actor to compromise vulnerable Microsoft Windows hosts. The ACSC strongly recommends applying available patches.

Read More arrow-img
  • 1
  • 2

3 Strategies to Reduce Telecom Cost