Australian Cyber Security Centre
Edit

Australian Cyber Security Centre

https://www.cyber.gov.au/acsc/report
Last activity: 29.04.2025
Active
Categories: BusinessFamilyGovTechInformationLocalMediaOnlinePageSecuritySocial
Working to protect Australians from cybercrime. Report incidents at cyber.gov.au or 📞 1300 CYBER 1
Followers
25.52K
Website visits
222.7K /mo.
Mentions
162
Location: Australia, Canberra
Employees: 201-500

Mentions in press and media 162

DateTitleDescription
29.04.2025Australian investors lose AUD $945 million to cyber scams-
28.04.2025AI’s impact on cybersecurity for the Australian federal election-
16.04.2025Australian councils urged to adopt managed security services-
16.04.2025Fraud against Australian businesses on the rise, report finds-
11.03.2025Australian IT leaders urge stronger government cyber action-
04.03.2025Cyber Security Awareness and Human Risk Management Leader SoSafe Launches in AustraliaBy leveraging behavioural science and learning psychology, SoSafe effectively trains users on cybersecurity, with the ultimate goal of strengthening self-defence in a digital and connected world. SoSafe was founded in 2018 and it has quickl...
12.02.2025New UK Sanctions Target Russian Cyber-crime NetworkThe UK is issuing a series of fresh sections against key players in the Russian cyber-crime supply chain. The new sanctions target ZSERVERS and six of its members, as well as its UK front company, XHOST Internet Solutions LP. ZSERVERS provi...
04.02.2025Australian businesses urged to join data security framework-
16.01.2025The Quantum Leap: Preparing Java for a Post-Quantum FutureIn the world of technology, change is the only constant. As we stand on the brink of a quantum revolution, the realm of cryptography is poised for a seismic shift. The upcoming Java 24, set to launch in March 2025, introduces two pivotal en...
15.01.2025Постквантовая криптография в JavaКоманда Spring АйО перевела статью про новые возможности грядущей версии Java 24, в которой появятся два JEP — 496 и 497, посвященные алгоритмам, устойчивым к квантовым атакам. Эти технологии базируются на решеточной криптографии и помогут ...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In