Incident Response
Quickly and effectively assess the incident and contain the threat before extensive damage has been done.
Cyber Maturity Assessment
Our Cyber Maturity Assessment service will give an in-depth, unbiased analysis of your cyber security posture.
Endpoint Protection
Detect, investigate and prevent suspicious activities and issues on your desktops, servers and remote devices.
Managed Detection & Response
Prevent cyber attacks with real-time monitoring that rapidly identifies cyber threats.
Crowdstrike
Protect your company with the CrowdStrike security platform, the market leader in next-generation cyber protection.
Rapid7
Rapid7 cyber security platform can provide your enterprise a broad range of security solutions.
Abnormal Security
Many cyber criminals attack small and medium sized businesses assuming they have a lower level of security.
Netskope
A cloud security solution from Netskope can deliver your company cyber protection for cloud, web and private applications.
About Cythera
An Australian cyber security company delivering world-class cyber protection
Partnerships & Clients
A global network of strong, trusted relationships in the cyber security industry
ISO 27001 Certification
View our ISO 27001 certificate
Case Studies
Cyber Security
WINDOWS KERBEROS REMOTE CODE EXECUTION VULNERABILITY - CVE-2…
WINDOWS KERBEROS REMOTE CODE EXECUTION VULNERABILITY CVE-2024-43639 What is vulnerable?The Kerberos Authentication system in …
Elevating Cloud Security and Optimisation with Cato Networks…
Around 44% of global companies now support remote work, and businesses are having to reshape how they structure and secure their …
Cutting Costs: How Cato Networks Resolves the High Price of …
In the late 90s, Multi-Protocol Label Switching (MPLS) transformed enterprise networking, enabling businesses to prioritise and r…
Industry News
FortiManager API Vulnerability - CVE-2024-47575
FortiManager API Vulnerability CVE: CVE-2024-47575 CVSS: 9.8/10 What is Vulnerable: Multiple versions of FortiManager are aff…
Common Unix Printing System (CUPS) - Critical Vulnerability
Common Unix Printing System (CUPS) - Critical VulnerabilityWhat Is VulnerableThe open-source printing system called “Common Uni…
Veeam Backup and Replication Vulnerability - CVE-2024-40711
Veeam Backup and Replication VulnerabilityCVE ID - CVE-2024-40711CVSS - 9.8/10What Is Vulnerable Veeam Backup & Replication 12.1…
Cythera News
Threat Hunting at Scale: How Cythera’s Latest Capabilities…
We’ve recently seen a rapid evolution in the sophistication of automated cybersecurity applications and functionality. Tools su…
Cythera Service
From COTS to Custom: How Cythera Elevates Cybersecurity with…
Let’s face it: Commercial Off-The-Shelf (COTS) security solutions have served their purpose well. In the early 2000s, when cybe…
Broadcom VMware Hypervisor Vulnerability CVE-2024-37085 - Ex…
Broadcom VMware Hypervisor VulnerabilityCVE: CVE-2024-37085What Is Vulnerable?Broadcom VMware ESXiVMware Cloud FoundationThe foll…
Global Crowdstrike Outage
UPDATE 10:15AM 25/07: Preliminary Post Incident Review Executive Summary - CrowdStrike CrowdStrike has released an executive sum…
Crafting Compelling Business Cases for Cybersecurity Funding…
In today’s volatile geopolitical and global economic environment, Australian small and medium-sized businesses (SMEs) face an e…
Unlocking Growth Through Security: Operationalising MDR for …
Australian small and medium-sized enterprises (SMEs) are at a critical juncture regarding cybersecurity. Recent data shows that 6…
Achieving Essential 8 Compliance: Why Cythera uses Automox f…
At Cythera, we understand the unique cybersecurity challenges faced by Australian organisations. The Australian Signals Directora…
Cythera and Druva: A Strategic Alliance for Essential Eight …
For Australian companies navigating the complexities of cyber resilience, having a dependable backup solution is not just a nice-…
Why Cythera partners with CrowdStrike to help customers achi…
Developed by the Australian Signals Directorate (ASD), The Essential 8 (E8) is a prioritised list of mitigation strategies design…
Cythera’s Board Advisory Service: Briefing your board on c…
In the face of rising cyber threats, the role of board members in safeguarding an organisation's digital assets and information h…
The Essential Eight's Role in Enhancing Cybersecurity Postur…
As we move into 2024, cybersecurity is the most pressing issue facing Australian businesses that find themselves grappling with a…
Security Legislation In Australia: Making Sense of the Optio…
In the realm of cyber security, frameworks serve as the backbone for creating, enhancing, and maintaining security protocols. For…
Top Cyber Attack Styles of 2023
Top Cyber Attack Styles of 2023 Cybersecurity professionals tirelessly match wits with cybercriminals, who are continuously honi…
Unlocking Cybersecurity with Cythera's Penetration Testing
Unlocking Cybersecurity with Cythera's Penetration TestingPenetration testing, often referred to as pen testing, is a vital cyber…
Common Scenarios Where Organisational Oversight Leads To Key…
Common Scenarios Where Organisational Oversight Leads To Key Cyber Vulnerabilities As Australian organisations move into 2024, t…
Cyber Insurance And Penetration Testing: How Australian Busi…
Cyber Insurance And Penetration Testing: How Australian Businesses Can Mitigate Cyber RiskIn the early 2000s, cyber insurance was…
Cyber Threats and the Israel-Hamas War
This threat landscape SOC Note does not cover any details of the ongoing ground war. Links to sources that contextualise the Isra…
Adversary Simulation: Aka. Red Teaming - Moving Beyond Penet…
Cythera are often approached by clients looking for Red Team services, social engineering and similar attacks which emulate real-…
Redefining Cybersecurity for Australian Law Firms: The Promi…
Redefining Cybersecurity for Australian Law Firms: The Promise of SASE Architecture The Australian legal sector's increasing ado…
Retail Resilience in the Digital Age: Conquering Cyber Chall…
Retail Resilience in the Digital Age: Conquering Cyber Challenges with SASE Technological advances along with changing customer …
Cyber Security in the Australian Manufacturing Sector: Empow…
Cyber Security in the Australian Manufacturing Sector: Empowering Industry 4.0 with SASEThe Australian manufacturing landscape is…
Safeguarding the Australian Health Sector with SASE: Beyond …
Safeguarding the Australian Health Sector with SASE: Beyond Perimeter Defense Across the Australian healthcare landscape, digita…
Common issues with the ACSC 37 Strategies
Common issues with the ACSC 37 Strategies to Mitigate Cyber Security Incidents The ACSC publication, Strategies To Mitigate Cybe…
Data Harvester Parading as a Legitimate Application -ZoomInf…
What is Happening?Cythera are reporting a significant increase in the installation of a potentially unwanted application called Z…
The Ugly Side of ISO 27001 Compliance. What Happens if You G…
We’re going to be candid and frank here. ISO 27001 audits, and any cybersecurity compliance audits at all, can be hard to achie…
ISO 27001 Checklist for Upcoming Audits in 2023 and 2024
As we roll through the mid-way point of the calendar year, and hit the start of the Australian financial year, a lot of Australia…
Upcoming ISO 27001 Audit? 5 Ways to Nail It.
Undergoing an ISO 27001 audit can be a stressful time, not only do you have your day-to-day role to manage, but you also need to …
Navigating ISO 27001 in Australia: What You Need to Know and…
In Australia, ensuring the security and protection of sensitive data has become increasingly important - high profile cybersecuri…
PaperCut Vulnerability - CVE-2023-27350, CVE-2023-27351
PaperCut MF & PaperCut NG VulnerabilitiesCVE: CVE-2023-27350, CVE-2023-27351 WHAT IS VULNERABLE? PaperCut MF or NG version 8.0…
An Outline of Australia’s Board Director Cyber Liability P…
Board Members and Directors can avoid harsh penalties by understanding what’s required of them.When the Australian Cyber Securi…
Does Your Business Meet Australian Security Legislation? A C…
Everything you need to maintain a compliant security strategy.The Australian Institute of Company Directors has stated an increas…
Microsoft Outlook for Windows 0-Day Vulnerability - CVE-2023…
Microsoft Outlook for Windows 0Day vulnerabilityCVE: CVE-2023-23397 WHAT IS VULNERABLE? All versions of Outlook for Windows Ou…
FORTIGUARD FIREWALL HEAP-BASED BUFFER OVERFLOW VULNERABILITY…
FORTIGUARD FIREWALL HEAP-BASED BUFFER OVERFLOW VULNERABILITY CVE: CVE-2022-25610What is VulnerableFortiOS version 7.2.0 through …
3 Security Threats Today’s Technologies Struggle To Protec…
Why you need a comprehensive Managed Detection and Response (MDR) service now more than ever.As the security industry adapts to m…
3 Ways To Check If Your Corporate Identity Is Being Imperson…
A guide to taking the first step towards protecting your brand from online impersonationCybersecurity attacks cost businesses fin…
How to Optimise the Value of Your MDR Service: A Guide to Un…
MDR has long been hailed as a proactive alternative to Security Information and Event Management (SIEM) software. But, with such …
4 Times Security Monitoring Technology Alone will Fail to Pr…
With clear advantages over its reactive alternatives, Managed Detection & Response (MDR) is fast becoming the world’s most popu…
Don’t Fall for the ‘Tick + Flick’ Trap: The difference…
An objection some customers have when we first connect is that they “already use a Managed Detection and Response service”, y…
Microsoft Exchange On-Prem Critical Vulnerabilities - CVE-20…
CVE: CVE-2022-41080, CVE-2022-41082 What Is Vulnerable? Microsoft Exchange Server (On-Premises) 2013, 2016, 2019 devices that h…
CRITICAL CITRIX ADC AND GATEWAY REMOTE CODE EXECUTION VULNER…
CRITICAL CITRIX ADC AND GATEWAY REMOTE CODE EXECUTION VULNERABILITY CVE: CVE-2022-27518 WHAT IS VULNERABLE?Citrix ADC and Citri…
How to prevent digital brand theft from destroying your busi…
As high-profile data breaches become commonplace, the Australian Cyber Security Centre encourages CEOs and other business leaders…
Fortiguard Firewall heap-based buffer overflow Vulnerability
Fortiguard Firewall heap-based buffer overflow Vulnerability CVE: CVE-2022-42475What is Vulnerable: FortiOS version 7.2.0 throu…
Critical Citrix ADC and Gateway Remote Authentication Bypass…
Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities CVE: CVE-2022-27510, CVE-2022-27513 and CVE-2022-27…
The 15 most important cybersecurity topics that every CEO ne…
With the New Year on its way, a number of Australian organisations are reflecting on the past year and wondering what they can be…
Top cyber-attacks of 2022.
2022 has been a year like no other for Australian businesses experiencing cyber attacks. With high-profile cases such as Optus on…
How to build a robust cybersecurity penetration testing prog…
In light of growing high-profile cyber security attacks in Australia, a number of organisations and enterprises are looking to im…
Ransomware attacks are on the rise in Australia. Here’s ho…
It's a rare occasion these days that you open up the Australian business news and DON’T see anything about a cybersecurity atta…
OpenSSL v3.0.x Buffer Overrun Vulnerability
CVE-2022-3602 – OpenSSL v3.0.x Buffer Overrun VulnerabilityCVE: CVE-2022-3602 and CVE-2022-3786What Is Vulnerable?: OpenSSL ver…
Cythera Announces Partnership with Abnormal Security
Cythera are proud to announce a new technology partnership with Abnormal Security, bringing next generation email protection to o…
Microsoft Office Remote Code Execution Vulnerability aka Fol…
CVE: CVE-2022-30190What Is Vulnerable? Windows Office 2013 and later, including the latest patches for Office 2021What’s Happen…
Windows enterprise environments vulnerable to KrbRelayUp att…
WHAT’S HAPPENING?In April 2022, a privilege escalation hacking tool known as KrbRelayUp was publicly disclosed on GitHub by sec…
What is Endpoint Protection?
What is Endpoint Protection? With modern business practices requiring an increased amount of network and cloud based operations …
What is Malware?
What is Malware? Malware is a broad term that refers to variety of malicious software cyber criminals use including: Worms Onc…
Cyber Awareness
How to Prevent Ransomware Attacks
How to Prevent Ransomware Attacks Ransomware incidents are becoming prolific in Australia. We’re seeing an increased amount of…
The Perfect 10 - Remote Code Execution in Apache Log4j Requi…
CVE: CVE-2021-44228 CVSS Score: 10 (Critical)What Is Vulnerable?: Apache Log4j Version 2.15-rc1 or prior. (All version prior to …
Easy (and Cheap!) ways to secure your corporate email domain
Email is such a critical business tool for many businesses. And the massive shift to a “Work from Anywhere” model has led to …
The Cythera Approach To Incident Response
We’re increasingly assisting more organisations respond to security incidents and breaches, in every industry vertical. If you …
Malware That Lives Beyond OS Rebuild
Normally if your machine is infected with malware, you can simply reinstall Windows, and the problem is solved, right? Not with t…
Does Your Organisation Need Cyber Security Training?
If you’re serious about protecting your company, then the only answer is yes! New employees are onboarded are expected to unde…
The Ransomware Playbook
[Updated March 2021] Ransomware incidents are becoming prolific. We’re seeing a steady stream of Australian businesses come to …
Amplify client engagement and relationships with Cythera
If you’re a managed service provider (MSP), you’re probably internally considering how to offer cyber security services to yo…
Partnerships should help build capability
Individuals and companies like to use the term ‘partnership’ when trying to build rapport and relationships. This creates a …
Why You Shouldn’t Be Reusing Passwords In 2020
Who out there has been guilty of reusing a password? We’re all guilty of it! Results from a recent Google survey discovered tha…
The greatest security toolset you may not be using : Visibil…
The Cythera security operations team has detected and responded to several security incidents with our clients over the last few …
Protecting a distributed workforce.
COVID-19 has quickly switched many organisations to full work remote / from home policies, and IT teams are dusting off disaster …
How we’re using Secure Web Gateway to quickly adapt custom…
Even post-COVID, a permanent shift to more remote and flexible working seems to be a theme for most organisations. This throws up…