-

Malicious Cyber Activity in Australia (ACSC / ASD Report 2022–23)
Australia faced significant risks from malicious cyber activities, with various actors showing intent and capability to compromise vital systems, according to the Cyber Threat Report (2022-2023) from the Australian Signals Directorate (ASD) released this week. Australian networks were targeted by both opportunistic and deliberate cyber activities. The ASD responded to over 1,100 cyber security incidents…
-

Cybersecurity in National Infrastructure: Lessons from Ukraine and Colonial Pipeline
In an increasingly connected world, the cybersecurity of national infrastructure has emerged as a strategic concern. Australia, like many nations, faces the rather daunting task of protecting its critical systems from cyber-threats. Recent incidents, such as the cyber-attack on DP World Australia, underscore the urgency and complexity of this challenge. This article explores the vulnerabilities,…
-

Cybersecurity Lessons from the Colonial Pipeline Incident
The Colonial Pipeline incident in May 2021 is a critical case study in understanding the vulnerabilities of critical infrastructure to cyber-threats. The Colonial Pipeline, a major fuel pipeline in the United States, was hit by a ransomware attack that led to a shutdown of its operations. This incident not only caused significant disruptions in fuel…
-

Ukraine Power Grid Attack – Infrastructure Cybersecurity Lessons For Australia
The Ukraine Power Grid Attack in December 2015 stands as a significant example of the vulnerabilities in critical national infrastructure and the potential impacts of a well-coordinated cyberattack. This incident marked the first known successful cyberattack on a power grid, causing substantial disruptions and serving as a wake-up call for nations worldwide, including Australia, about…
-

Australian Port Cyberattack Highlights Importance of Protecting Vital Infrastructure
DP World Australia, a major Australian port operator, shut down its terminals across the country in response to a “cybersecurity incident” last week. The incident, affecting terminals in Sydney, Melbourne, Brisbane, and Fremantle, was identified on Friday morning, leading to the closure of the ports that afternoon. The company resumed limited operations this morning –…
-

Eavesdroppers, Code Breakers, and Digital Snoops: Inside Australia’s Secret Intelligence Branch
This article explores the Australian Signals Directorate (ASD), one of the most secretive branches of Australian intelligence. The ASD plays a crucial role in eavesdropping on foreign communications, breaking codes, and conducting digital espionage. Established during World War II, the ASD has evolved into a sophisticated cyber warfare unit that protects Australia from foreign threats…
-

Internet Shutdowns: How Governments Control Access to Information
Governments around the world increasingly resort to internet shutdowns to control information and limit communication during periods of unrest or political turmoil. These shutdowns, which can range from restricting access to specific platforms like social media to cutting off entire countries from the internet, are a powerful tool for curbing dissent and preventing the spread…
-

How Drone Submarines Are Turning the Seabed Into a Future Battlefield
Drone submarines, also known as unmanned underwater vehicles (UUVs), are rapidly transforming the seabed into a new and critical battleground. These autonomous vessels are designed to conduct a range of military operations, from intelligence gathering to laying underwater mines, and are becoming essential tools in modern naval warfare. As countries race to develop and deploy…
-

Does your employer have to tell if they’re spying on you through your work computer?
As workplace surveillance becomes more common, many employees are left wondering whether their employers are required to inform them about being monitored. The answer depends on the country and local regulations, but in many cases, employers have the right to monitor employees’ activity on work devices and networks. However, transparency around this surveillance is not…

