Thursday, 26 March 2026

ASD's ACSC issues guidance on cybersecurity for low-earth orbit satellite communications

 

Key Takeaways

  • Cybersecurity Risks: LEO SATCOM faces threats such as jamming, unauthorized command injection, spoofing, malware, and tampering.
  • Legacy Systems: Older satellite systems may lack secure architectures and rely on unencrypted protocols.
  • Ground Stations: Highly interconnected and susceptible to malware, social engineering, and denial-of-service attacks.
  • User Terminals: Vulnerable to poor endpoint security, unpatched software, and insecure configurations.
  • Supply Chains: Risks include hardware backdoors, component tampering, and inconsistent vendor security practices.

Boy charged for collecting terrorism material

 

Published:
Wednesday 25 March 2026 at 2:29 pm

This is a joint release between the Australian Federal Police, Victoria Police and the Australian Security Intelligence Organisation

A boy has been charged by the Victorian Joint Counter Terrorism Team (JCTT) with allegedly collecting manuals, guides and material promoting ISIS-inspired terrorism.

Why legacy systems have become cybersecurity's least trusted zone

Most large Australian organisations still rely on systems that were built more than a decade ago. Legacy investment platforms, policy administration systems, industrial control environments and enterprise resource planning stacks continue to underpin daily operations. They process critical data, support revenue, and in many cases cannot be easily replaced.

Decoding Trump: How Australia must navigate the President's erratic behaviour

When I was in the Defence Intelligence Organisation, we analysed foreign military leaders - their strengths, weaknesses, health status and likely successors. The CIA's Office of Leadership Analysis did much the same for political figures, even attempting to collect biological samples for health