Read CERT NZ's latest Quarterly Report

Read now
Skip to main content
Cert logo Created with Sketch. Return to homepage

Main navigation

  • Individuals
    • Guides
      • Guides
      • Getting started with cyber security
        • Getting started with cyber security
        • Top 11 tips for cyber security
        • How to create a good password
        • Backing up data and devices
        • Use two-factor authentication to protect your accounts
        • Keep your data safe with a password manager
        • Protecting your privacy online
        • Keep up with your updates
        • Report an issue
      • Stepping up your cyber security
        • Stepping up your cyber security
        • Secure your home network
        • Buying a new device
        • Cyber security and social media
        • Keeping your mobile phone safe and secure
        • Shopping online safely
        • Cryptocurrency security
        • How the cloud works
        • Ditch your older device
        • Report an issue
      • Report an issue
    • Explore
      • Explore
      • Credential dumps
      • Report an issue
    • Alerts
      • Alerts
      • Financial sector targeted in blackmail campaign
      • Serious vulnerability in popular forum software - vBulletin
      • Serious issue with older Microsoft Windows systems
      • Christchurch tragedy-related scams and attacks
      • Google Chrome web browser security issue
      • Bomb threat emails affecting New Zealanders
      • Webcam and password blackmail scam
      • Malware targeting business customers of New Zealand banks
      • Invoice scams affecting New Zealand businesses
      • New malware found on routers
      • Misuse of Cisco devices
      • RealMe phishing emails
      • Vulnerabilities in computer processors
      • Ransomware, called Bad Rabbit, affecting international systems
      • KRACK attack: Security weaknesses affecting wi-fi enabled devices
      • Kovter malware being distributed on adult websites
      • BlueBorne: Security vulnerabilities affecting Bluetooth devices
      • Onliner Spambot release of 711 million credentials
      • MPI phishing scam
      • Email compromise and invoice scam
      • Webcam blackmail scam
      • NotPetya ransomware campaign targeting Microsoft Windows computers
      • Phone scammers claiming to provide WannaCry ransomware support
      • WannaCry Ransomware used in large scale international attacks
      • 1 billion username and password credentials released
      • Google Docs phishing attack
      • Phone scammers claiming to be from CERT NZ
      • Phone scam affecting businesses and government organisations
      • Office 365 phishing and credential harvesting campaign
      • Report an issue
    • Report an issue
  • Business
    • Guides
      • Guides
      • Business basics
        • Business basics
        • Top 11 cyber security tips for your business
        • Using two-factor authentication (2FA) to secure your business
        • Backups for your business
        • Choosing an IT service provider
        • Secure your small business network
        • Report an incident
      • Secure your website
        • Secure your website
        • Protect your website
        • Benefits of making your website use HTTPS
        • Set up logs for your website
        • Report an incident
      • Policies and processes
        • Policies and processes
        • Create a cyber security policy for your business
        • Create a password policy for your business
        • Cyber security awareness for your staff
        • Cyber security risk assessments for business
        • Report an incident
      • Responding to incidents
        • Responding to incidents
        • Getting a vulnerability report
        • Creating an incident response plan
        • What to do after you’ve identified a cyber security incident
        • Report an incident
      • Report an incident
    • Common threats
      • Common threats
      • Protecting your business from spear phishing and whaling
      • Phishing scams and your business
      • Business email compromise
      • Report an incident
    • Alerts
    • Report an incident
  • IT specialists
    • Guides
      • Guides
      • Legacy systems
        • Legacy systems
        • Identifying and managing legacy systems
        • Mitigating legacy systems
        • Report an incident
      • Mobile device management
        • Mobile device management
        • Managing mobile devices on your network
        • Report an incident
      • How to report a vulnerability
      • Report an incident
    • Critical controls
      • Critical controls
      • Multi-factor authentication
        • Multi-factor authentication
        • Implementing multi-factor authentication
        • Report an incident
      • Patching
        • Patching
        • Implementation advice for patching
        • Creating a standard patching process
        • Report an incident
      • Default credentials
        • Default credentials
        • Changing default credentials
        • Report an incident
      • Application whitelisting
        • Application whitelisting
        • Implementing application whitelisting
        • Report an incident
      • Implement and test backups
        • Implement and test backups
        • Backing up your data
        • Report an incident
      • Centralised logging
        • Centralised logging
        • Configuring centralised logging
        • Report an incident
      • Network segmentation and separation
        • Network segmentation and separation
        • Architecting network segmentation
        • Report an incident
      • Cloud-based identity providers and authentication
        • Cloud-based identity providers and authentication
        • Configuring central identity providers
        • Report an incident
      • Report an incident
    • Advisories
      • Advisories
      • DDoS extortion campaign targeting financial sector
      • Virtual private network (VPN) vulnerabilities being exploited
      • Vulnerability and zero-day exploit targeting vBulletin forum software
      • 'Urgent 11' vulnerabilities in VxWorks operating systems
      • Oracle WebLogic vulnerability being exploited
      • Exim Mail Transfer Agent (MTA) vulnerability being exploited
      • Critical vulnerability in Microsoft remote desktop services no
      • Microsoft SharePoint vulnerability being exploited
      • Google Chrome web browser vulnerability
      • UPnProxy and 'EternalSilence' being used to exploit routers
      • Banking malware targeting business customers of New Zealand banks
      • VPNFilter malware
      • S/MIME and OpenPGP email client vulnerability
      • Cisco Smart Install misuse
      • MikroTik RouterOS vulnerability
      • Memcached reflection denial-of-service
      • Meltdown and Spectre CPU vulnerabilities
      • Certain TLS-RSA implementations susceptible to ROBOT attack
      • Bad Rabbit Ransomware affecting Eastern European networks
      • ROCA: Major security flaw in crypto keys discovered
      • KRACK attack: security vulnerabilities in WPA1+2
      • BlueBorne: Bluetooth security vulnerabilities
      • Onliner Spambot release of 711 million credentials
      • MPI phishing scam
      • New ransomware campaign known as NotPetya
      • Shadow Brokers release of software vulnerabilities
      • Anti Public and Exploit.in release of credentials
      • WannaCry Ransomware used in large scale international attacks
      • Global campaign targeting multi-national IT service providers
      • Report an incident
    • Report an incident
  • About
    • About us
    • Quarterly reports
      • Quarterly reports
      • Quarter Three Report 2019
      • Quarter Two Report 2019
      • Quarter One Report 2019
      • 2018 Report Summary
      • Quarter Four Report 2018
      • Quarter Three Report 2018
      • Quarter Two Report 2018
      • Quarter One Report 2018
      • Quarter Four Report 2017
      • Quarter Three Report 2017
      • Quarter Two Report 2017
    • Our partners
    • Contact us
Subscribe to updates Group 18 Copy 6 Created with Sketch.
Twitter updates Fill 1 Copy 4 Created with Sketch.

Alerts

We highlight current cyber security threats in New Zealand, and provide guidance on what to do if they affect you.

05 Nov 2019

Serious issue with older Microsoft Windows systems

An issue was discovered in older Windows systems, which allows attackers to remotely connect to and access user’s accounts. Software updates are available to resolve the issue.

01 Nov 2019

Financial sector targeted in blackmail campaign

Criminals threaten denial-of-service attack against financial companies unless ransom is paid.

26 Sep 2019

Serious vulnerability in popular forum software - vBulletin

An issue has been discovered in the forum software vBulletin. This issue could allow attackers to access user data on forums that use vBulletin.

18 Mar 2019

Christchurch tragedy-related scams and attacks

Scammers are using the Christchurch tragedy as an opportunity to carry out online scams and attacks.

07 Mar 2019

Google Chrome web browser security issue

Google has released a software update for a security issue in its Chrome browser.

14 Dec 2018

Bomb threat emails affecting New Zealanders

CERT NZ is aware of bomb threat blackmail emails being received both internationally and in New Zealand.

While this is likely to be an opportunistic scam, New Zealand Police are working to confirm the validity of the threats. If you receive the email, we encourage you to contact New Zealand Police on 111.

Show More

Footer

  • About us
  • Contact us
  • Traffic light protocol
  • © 2019 CERTNZ

  • Copyright
  • Disclaimer
  • Privacy and information statement
NZ coat of arms logo New Zealand Government NZ govt logo Created with Sketch.

>Glossary Term