Back to Articles
Russian Cyber Campaign Targets Western Logistics and Technology Sectors

Cyber.gov.au

READ

Details

Date Published
22 May 2025
Priority Score
3
Australian
Yes
Created
29 May 2025, 06:38 pm

Authors (0)

No authors linked

Description

<a href="https://news.google.com/rss/articles/CBMiyAFBVV95cUxPUHRFS3VBbFBLR3gyZnp0OWxRN0MwQzFRTHhwSGM3Y056MHVHc0pBa3FEVGVzYXBTbngxUmV1cGtsdU1SZFBWYi03dnl6WDY5cFE4TEtkSkZ6SUFMaFpUSWpOQmY5VzY3MmdxSGJxdVQ3SzRVQVVnNXpRQ1dhZ2V3ZjdXQ0ktOUlCUmVyUlY0SWJ0TU9lZUxOX092TEZLcDNMNEtfRHEyZlE5dEswb25JYTgtaUszTEZER1ZRVWxybkh5MEtIbXhRSg?oc=5" target="_blank">AI Data Security</a>&nbsp;&nbsp;<font color="#6f6f6f">Cyber.gov.au</font>

Summary

The article highlights a cybersecurity advisory regarding a Russian state-sponsored cyber campaign targeting Western logistics and technology sectors, signaling significant threats to critical infrastructure. This development underscores the intersection of global cybersecurity and AI, emphasizing the need for robust data security within AI systems. The Australian Signals Directorate (ASD) plays a pivotal role in addressing these vulnerabilities, which can indirectly affect AI safety by safeguarding the data that underpins AI capabilities. The emphasis on AI data security practices reflects a proactive measure in reducing broader catastrophic risks associated with AI exploitation through cyber vulnerabilities.

Body

Protect yourselfWhere to get helpReport and recover from identity theftRecognise and report scamsResourcesEssential EightInformation Security ManualIRAPToolsSo you think you've been hackedRansomware PlaybookBusiness Continuity in a BoxRussian GRU targeting Western logistics entities and technology companiesThis joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies.Audience focus:Small & medium businessesOrganisations & Critical InfrastructureGovernmentMultiple Vulnerabilities In Ivanti Endpoint Manager Mobile (Ivanti EPMM)The Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) is aware of two vulnerabilities, one medium and one high severity, in Ivanti Endpoint Manager Mobile (EPMM). The ASD…Audience focus:Organisations & Critical InfrastructureGovernmentExploitation of existing Fortinet VulnerabilitiesFortinet has released information regarding exploitation of previously known vulnerabilities affecting Fortinet devices.ASD’s ACSC recommends customers follow the advice contained in…Audience focus:Small & medium businessesOrganisations & Critical InfrastructureGovernmentAustralian Signals Directorate’s Cyber Security Partnership ProgramRegister to become an ASD PartnerNever miss a threatSign up for the latest cyber security alerts and get information on threats and how to keep yourself secure online.Your nameEmailThis site is protected by reCAPTCHA and the GooglePrivacy PolicyandTerms of Serviceapply.reCAPTCHAv3 Validation ResponseInformation and resourcesI’m interested in information for:Individuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernmentResources for individuals and familiesMost people use the internet on a daily basis which can expose them to cyber attacks. Learn how to recognise the threats and protect yourself from cybercriminals.Resources libraryResources for individuals, families and small businessesTranslated informationWe have developed easy-to-follow cybersecurity information and resources to support people from non-English speaking backgrounds to be more cyber secure.Cybercrime - getting helpIf something has knocked you offline, check out the following information to help you get back up and running!New advice on implementing SIEM/SOAR platforms in your organisationASD has published a publication series about Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms in collaboration with our international partners.New joint advice on artificial intelligence data securityLearn about significant data security risks and best practices for securing data throughout the artificial intelligence (AI) system lifecycle.