Thursday, 26 March 2026

ASD's ACSC issues guidance on cybersecurity for low-earth orbit satellite communications

 

Key Takeaways

  • Cybersecurity Risks: LEO SATCOM faces threats such as jamming, unauthorized command injection, spoofing, malware, and tampering.
  • Legacy Systems: Older satellite systems may lack secure architectures and rely on unencrypted protocols.
  • Ground Stations: Highly interconnected and susceptible to malware, social engineering, and denial-of-service attacks.
  • User Terminals: Vulnerable to poor endpoint security, unpatched software, and insecure configurations.
  • Supply Chains: Risks include hardware backdoors, component tampering, and inconsistent vendor security practices.

Boy charged for collecting terrorism material

 

Published:
Wednesday 25 March 2026 at 2:29 pm

This is a joint release between the Australian Federal Police, Victoria Police and the Australian Security Intelligence Organisation

A boy has been charged by the Victorian Joint Counter Terrorism Team (JCTT) with allegedly collecting manuals, guides and material promoting ISIS-inspired terrorism.

Why legacy systems have become cybersecurity's least trusted zone

Most large Australian organisations still rely on systems that were built more than a decade ago. Legacy investment platforms, policy administration systems, industrial control environments and enterprise resource planning stacks continue to underpin daily operations. They process critical data, support revenue, and in many cases cannot be easily replaced.

Decoding Trump: How Australia must navigate the President's erratic behaviour

When I was in the Defence Intelligence Organisation, we analysed foreign military leaders - their strengths, weaknesses, health status and likely successors. The CIA's Office of Leadership Analysis did much the same for political figures, even attempting to collect biological samples for health

Wednesday, 25 March 2026

Strengthening our partnership with the Federated States of Micronesia



  • Joint media release with:
  • The Hon Pat Conroy MP, Minister for Pacific Island Affairs 
24 March 2026

The Australian Government this week welcomes the President of the Federated States of Micronesia (FSM) H.E. Wesley W. Simina to Canberra, marking the first official bilateral visit by an FSM head of state in nearly 30 years.


link

NSW JCTT charges young person with terrorism offences

 This is a joint release between the Australian Federal Police, NSW Police Force, Australian Security Intelligence Organisation and the NSW Crime Commission

A 16-year-old boy is set to appear in a NSW Children’s Court today (25 March, 2026) charged with terrorism offences following an investigation by the NSW Joint Counter Terrorism Team (NSW JCTT).


link

Oakville Community Alert: Far-Right Recruitment Targets Local Youth Online


 

Concerns have been raised after a far-right political organisation used a local Facebook community page to promote recruitment targeting young people in Oakville.


link

Why Every Australian Business Needs Managed Cyber Security Services in 2026

 


As cyber threats continue to evolve, Australian businesses face unprecedented challenges in safeguarding their digital assets. In 2026, the need for robust managed cyber security services has never been more critical. This article explores the importance of these services, detailing how they protect businesses from various cyber threats while ensuring compliance with Australian standards. Readers will learn about the core components of managed cyber security, the key threats facing businesses today, and the benefits of investing in these essential services. By understanding the landscape of cyber security, businesses can make informed decisions to enhance their network protection and risk management strategies.


link

Securing space

 


Introduction

The rapid expansion and increasing reliance on Low Earth Orbit (LEO) satellite communication (SATCOM) systems have introduced significant cyber security challenges. As LEO satellite constellations grow, the attack surface for adversaries increases. This growth puts critical networks that depend on these satellite services at greater risk. Securing this infrastructure is essential to ensuring the resilience of commercial communications, national security systems and emergency response capabilities.

Example use cases for LEO SATCOM services include:

  • delivering low-latency and high-bandwidth internet to remote areas for consumers and businesses
  • enabling direct-to-device communication
  • supporting mobile backhaul
  • facilitating Internet of Things (IoT) connectivity.

LEO SATCOM systems improve network resilience and enable emergency communications across both government and private sectors. They are used in sectors such as telecommunications, mining, agriculture, healthcare, and maritime operations.

A successful cyber attack could lead to service disruptions, exposure of sensitive data, and even physical harm to individuals and assets. This reinforces the urgent need for robust cyber security measures.


link to page ..

Thursday, 7 July 2022

How resilient is your business to email scam?

BEC is a type of email scam in which an attacker targets a person or business to steal data or sensitive information, then attempts to defraud victims by fooling them into making payments or changing banking details by impersonating trusted senders, including employees, vendors or companies.