Buying your next home?
See our home loan tools, articles and resources to help you explore your home loan options. We'll help you get to a good place.
Stay informed on the latest scams, fraud, and security alerts. Learn about emerging cyber threats and important online risks as they arise. If you are a business, make sure to stay updated with the latest business security alerts that could impact you.
Explore the latest alerts below, and make informed decisions to help keep your personal and banking details safe.
Businesses: See latest security alerts
Posted on 17 April 2025
Type:
Malware is any kind of malicious software or code designed to exploit a computer, including computer viruses, worms, trojans, spyware or other malicious programs. Malware can be installed on a device without the user's knowledge or permission, often through email attachments, malicious websites, or compromised software. To help protect our customers, ANZ uses security software to detect if any malware may be present in your Internet Banking session, and if malware is detected, ANZ might lock your CRN from accessing Internet Banking. To get your CRN unlocked and proceed with Internet Banking, you will need to call our call centre on 13 33 50.
Posted on 12 March 2025
Type:
ANZ urges Australians to stay alert to cyber criminals attempting to exploit Ex-Tropical Cyclone Alfred's aftermath by impersonating trusted organisations through fake emails, texts, or calls. Cyber criminals may pose as banks, insurance companies, non-profit organisations, or disaster relief services to exploit those impacted by the natural disaster and deceive them into revealing personal information or making payments. Vigilance and caution is highly encouraged to protect personal information and ensure donations go to verified relief efforts.
Visit ANZ Media Release for more information.
In a genuine ANZ call, SMS message or email, we will never ask you to:
Posted on 21 February 2025
Type:
ScamWatch has published an alert advising that criminals posing as legitimate businesses are offering fake investment bonds, claiming that they offer high returns that are protected by the government. They encourage people to register their personal details on fake websites, steal money by getting people to buy fake investment bonds, and also use your personal details to commit other scams.
Posted on 05 February 2025
Type:
The ASD's ACSC has published an alert advising of emails and phone calls from cybercriminals claiming to be them.
The content of the scam emails and phone calls vary but typically ask you to give personal information (such as passwords or bank details), money or ask you to download software.
To make the scam emails appear legitimate, cybercriminals have been using the ASD’s ACSC logo and signature block.
Posted on 17 April 2025
Type:
The ASD's ACSC has published a critical alert regarding vulnerabilities affecting exploitation of existing Fortinet Vulnerabilities.
Customers are encouraged to update their devices and investigate for potential compromise.
Fortinet has released information regarding their observation of active exploitation of previously known vulnerabilities affecting Fortinet devices, including:
Fortinet have previously released patches for these vulnerabilities.
The observed post exploitation activity relates to either unpatched devices or those that were compromised prior to patching.
Posted on 08 April 2025
Type:
The ASD's ACSC has published a critical alert regarding vulnerabilities affecting Pulse/Ivanti Connect Secure, Policy Secure and Neurons for ZTA gateways (CVE-2025-22457).
Ivanti has released information regarding a critical unauthenticated buffer overflow vulnerability in Ivanti Connect Secure, Policy Secure and Neurons for ZTA gateways (CVE-2025-22457).
Ivanti has observed active exploitation associated with this vulnerability.
Affected products include:
Pulse Connect Secure 9.1X is end of support as of 31 December 2024.
Posted on 28 March 2025
Type:
A critical alert has been published regarding vulnerabilities affecting Next.js authentication bypass.
The vulnerability could allow a remote attacker to bypass security checks, including many forms of authentication.
Affected versions/applications:
Posted on 28 March 2025
Type:
A critical alert has been published regarding vulnerabilities affecting Ingress-NGINX Controller for Kubernetes.
The vulnerabilities could allow unauthenticated remote code execution and full cluster takeover.
The following vulnerabilities are:
App Store is a service mark of Apple Inc. Google Play and the Google Play logo are trademarks of Google LLC