ransomware

2021 Australian Cybersecurity Risk Report

The 2021 Australian Cybersecurity Risk Report is our inaugural report into the cybersecurity landscape across small to large businesses in Australia. This report focuses on the approaches businesses are taking towards securing their systems and data and reveals the concerns individuals have around the business impacts of a potential cyber-attack within their organisation. This report […]

2021 Australian Cybersecurity Risk Report Read More »

Ransomware Action Plan

Minister’s foreword The Australian Government’s cyber security vision is to create a more secure online world for Australians, their businesses and essential services. However, Australia faces a rapidly evolving strategic environment, punctuated by increasing malicious cyber activity conducted by transnational, serious and organised crime groups and individuals. This Ransomware Action Plan sets out the Government’s

Ransomware Action Plan Read More »

Threat report T2 2021

Welcome to the T2 2021 issue of the ESET Threat Report! Despite threats seemingly looming around every corner (I’m looking at you, Delta), the past four months were the time of summer vacations for many of us, offering a much-needed break after the tough start of the year. I wish the same could be said

Threat report T2 2021 Read More »

Phishing Insights 2021

While phishing has been around for a quarter of a century, it remains an effective cyberattack technique primarily because it continues to evolve. Adversaries are quick to identify new phishing opportunities – of which the pandemic provided many – and develop new tactics and techniques. For organizations, phishing is often the first step in a

Phishing Insights 2021 Read More »

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation

GOALS The goals of this paper are to demonstrate how dangerous ransomware has become, describe the latest techniques used by ransomware gangs, and suggest what your organization can do to reduce exposure to, and damage from, ransomware attacks. Three ransomware attack vectors are addressed in this order: remote access, email, and supply chain. RANSOMWARE —

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation Read More »