Buying your next home?
See our home loan tools, articles and resources to help you explore your home loan options. We'll help you get to a good place.
Stay informed on the latest scams, fraud, and security alerts. Learn about emerging cyber threats and important online risks as they arise. If you are a business, make sure to stay updated with the latest business security alerts that could impact you.
Explore the latest alerts below, and make informed decisions to help keep your personal and banking details safe.
Businesses: See latest security alerts
Type:
Individuals should be aware of increased scam activity as sophisticated cyber criminals take advantage of the busy tax period. During this busy time, scammers may use sophisticated tactics to try and catch you off guard. There are various types of scams, and the intent is clear - they want to steal your money or personal information.
Cyber criminals attempt to take advantage of this time of year with tax-related impersonation scams, namely those appearing to originate from the Australian Tax Office (ATO) or other government services such as myGov.
If you are unsure about the authenticity of a call or message, contact the ATO or applicable government service to verify.
For more information about rebate, refund and EOFY scams visit Rebate and refund scams online.
Posted on 17 April 2025
Type:
Malware is any kind of malicious software or code designed to exploit a computer, including computer viruses, worms, trojans, spyware or other malicious programs. Malware can be installed on a device without the user's knowledge or permission, often through email attachments, malicious websites, or compromised software.
To help protect our customers, ANZ uses security software that may detect if malware is present. If malware is detected, ANZ might lock your CRN from accessing Internet Banking. To get your CRN unlocked and proceed with Internet Banking, you will need to contact us.
Posted on 12 March 2025
Type:
ANZ urges Australians to stay alert to cyber criminals attempting to exploit Ex-Tropical Cyclone Alfred's aftermath by impersonating trusted organisations through fake emails, texts, or calls. Cyber criminals may pose as banks, insurance companies, non-profit organisations, or disaster relief services to exploit those impacted by the natural disaster and deceive them into revealing personal information or making payments. Vigilance and caution is highly encouraged to protect personal information and ensure donations go to verified relief efforts.
Visit ANZ Media Release for more information.
In a genuine ANZ call, SMS message or email, we will never ask you to:
Posted on 19 May 2025
Type:
The ASD's ACSC has published an alert regarding 2 vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM).
The 2 vulnerabilities the ASD's ACSC is tracking in Ivanti EPMM are:
When chained together, these vulnerabilities can provide unauthenticated attackers Remote Code Execution.
All versions of Ivanti EPMM prior to and including 12.5.0.0 are vulnerable.
Posted on 17 April 2025
Type:
The ASD's ACSC has published a critical alert regarding vulnerabilities affecting exploitation of existing Fortinet Vulnerabilities.
Customers are encouraged to update their devices and investigate for potential compromise.
Fortinet has released information regarding their observation of active exploitation of previously known vulnerabilities affecting Fortinet devices, including:
Fortinet have previously released patches for these vulnerabilities.
The observed post exploitation activity relates to either unpatched devices or those that were compromised prior to patching.
Posted on 08 April 2025
Type:
The ASD's ACSC has published a critical alert regarding vulnerabilities affecting Pulse/Ivanti Connect Secure, Policy Secure and Neurons for ZTA gateways (CVE-2025-22457).
Ivanti has released information regarding a critical unauthenticated buffer overflow vulnerability in Ivanti Connect Secure, Policy Secure and Neurons for ZTA gateways (CVE-2025-22457).
Ivanti has observed active exploitation associated with this vulnerability.
Affected products include:
Pulse Connect Secure 9.1X is end of support as of 31 December 2024.
Posted on 28 March 2025
Type:
A critical alert has been published regarding vulnerabilities affecting Next.js authentication bypass.
The vulnerability could allow a remote attacker to bypass security checks, including many forms of authentication.
Affected versions/applications:
Posted on 28 March 2025
Type:
A critical alert has been published regarding vulnerabilities affecting Ingress-NGINX Controller for Kubernetes.
The vulnerabilities could allow unauthenticated remote code execution and full cluster takeover.
The following vulnerabilities are:
App Store is a service mark of Apple Inc. Google Play and the Google Play logo are trademarks of Google LLC