Incident Response
Quickly and effectively assess the incident and contain the threat before extensive damage has been done.
Cyber Maturity Assessment
Our Cyber Maturity Assessment service will give an in-depth, unbiased analysis of your cyber security posture.
Endpoint Protection
Detect, investigate and prevent suspicious activities and issues on your desktops, servers and remote devices.
Managed Detection & Response
Prevent cyber attacks with real-time monitoring that rapidly identifies cyber threats.
Crowdstrike
Protect your company with the CrowdStrike security platform, the market leader in next-generation cyber protection.
Rapid7
Rapid7 cyber security platform can provide your enterprise a broad range of security solutions.
Abnormal Security
Many cyber criminals attack small and medium sized businesses assuming they have a lower level of security.
Netskope
A cloud security solution from Netskope can deliver your company cyber protection for cloud, web and private applications.
About Cythera
An Australian cyber security company delivering world-class cyber protection
Partnerships & Clients
A global network of strong, trusted relationships in the cyber security industry
Cythera Service
Cythera Announces Partnership with Abnormal Security
Cythera are proud to announce a new technology partnership with Abnormal Security, bringing next generation email protection to o…
Cyber Security
Microsoft Office Remote Code Execution Vulnerability aka. Fo…
CVE: CVE-2022-30190What Is Vulnerable? Windows Office 2013 and later, including the latest patches for Office 2021What’s Happen…
Industry News
Windows enterprise environments vulnerable to KrbRelayUp att…
WHAT’S HAPPENING?In April 2022, a privilege escalation hacking tool known as KrbRelayUp was publicly disclosed on GitHub by sec…
What is Endpoint Protection?
What is Endpoint Protection? With modern business practices requiring an increased amount of network and cloud based operations …
What is Malware?
What is Malware? Malware is a broad term that refers to variety of malicious software cyber criminals use including: Worms Onc…
Cyber Awareness
How to Prevent Ransomware Attacks
How to Prevent Ransomware Attacks Ransomware incidents are becoming prolific in Australia. We’re seeing an increased amount of…
The Perfect 10 - Remote Code Execution in Apache Log4j Requi…
CVE: CVE-2021-44228 CVSS Score: 10 (Critical)What Is Vulnerable?: Apache Log4j Version 2.15-rc1 or prior. (All version prior to …
Easy (and Cheap!) ways to secure your corporate email domain
Email is such a critical business tool for many businesses. And the massive shift to a “Work from Anywhere” model has led to …
Cythera News
The Cythera Approach To Incident Response
We’re increasingly assisting more organisations respond to security incidents and breaches, in every industry vertical. If you …
Malware That Lives Beyond OS Rebuild
Normally if your machine is infected with malware, you can simply reinstall Windows, and the problem is solved, right? Not with t…
Does Your Organisation Need Cyber Security Training?
If you’re serious about protecting your company, then the only answer is yes! New employees are onboarded are expected to unde…
The Ransomware Playbook
[Updated March 2021] Ransomware incidents are becoming prolific. We’re seeing a steady stream of Australian businesses come to …
Amplify client engagement and relationships with Cythera
If you’re a managed service provider (MSP), you’re probably internally considering how to offer cyber security services to yo…
Partnerships should help build capability
Individuals and companies like to use the term ‘partnership’ when trying to build rapport and relationships. This creates a …
Why You Shouldn’t Be Reusing Passwords In 2020
Who out there has been guilty of reusing a password? We’re all guilty of it! Results from a recent Google survey discovered tha…
The greatest security toolset you may not be using : Visibil…
The Cythera security operations team has detected and responded to several security incidents with our clients over the last few …
Protecting a distributed workforce.
COVID-19 has quickly switched many organisations to full work remote / from home policies, and IT teams are dusting off disaster …
How we’re using Secure Web Gateway to quickly adapt custom…
Even post-COVID, a permanent shift to more remote and flexible working seems to be a theme for most organisations. This throws up…