Trusted cyber incident response & IT forensics specialists across Australia
Trusted cyber incident response & IT forensics specialists across Australia
Cyber incident response details and insights
Engagement Example 1:
Post-incident analysis report
After a cyber incident, Cythera was brought in to deliver a Post-Incident Review. Through interviews, documentation analysis, and process review, we identified the root causes and critical breakdowns in the response. The engagement resulted in 23 prioritised recommendations to strengthen readiness and enhance long-term resilience.
- Conducted interviews with 12 staff and vendors to gain a complete picture
- Reviewed incident data, responsibilities, and response workflows
- Delivered 23 targeted actions for improvement
Engagement Example 2:
Root cause analysis of CI/CD pipeline failure
After a major credential exposure, Cythera supported the customer with incident response and root cause analysis. We collaborated with key stakeholders to uncover what went wrong, restore systems safely, and put preventative measures in place to reduce future risk.
- Uncovered the root cause of credential exposure during deployment
- Enabled secure rollback and redeployment of affected services
- Provided guidance on remediation and long-term prevention
Engagement Example 3:
Account enumeration
When Account Enumeration Reconnaissance was flagged by Microsoft Defender for Identity, Cythera stepped in to assist. We led the investigation, worked closely with third-party providers, and helped the organisation strengthen containment and enhance monitoring.
- Implemented CrowdStrike Falcon with threat intelligence for greater visibility
- Examined log inconsistencies and explained rollover behaviour
- Uncovered incorrect firewall settings impacting MFN connectivity
Engagement Example 4:
Misconfigured GCP settings lead to data exposure
Cythera investigated a cloud data exposure impacting a SaaS provider, where misconfigured Google Cloud Bucket permissions left 2.4 million files publicly accessible and searchable online.
- Detected public access misconfiguration in Google Cloud Storage bucket
- Advised implementation of secure access policies and signed URLs
- Provided guidance on logging practices, access permissions, and ongoing security testing
Engagement Example 5:
Credential leak resulting from BYOD usage
Cythera investigated a security incident where malware on a personal device compromised Microsoft 365 session credentials. Thanks to a fast response and thorough forensic analysis, we confirmed there was no unauthorised access to the organisation’s systems.
- Investigated compromised personal and corporate devices for signs of credential theft
- Retrieved browsing data even after history was manually cleared
- Advised implementing controls for secure device access and session management
Engagement Example 6:
Sensitive internal documents exposed following insider breach
Cythera investigated a suspected data breach involving unauthorised access to a sensitive document. Our forensic analysis revealed system reinstalls, missing logs, signs of data concealment, and clear indicators of intent.
- Investigated multiple devices and identified use of data-wiping tools
- Detected log gaps caused by unmonitored or un-onboarded endpoints
- Discovered chat messages indicating intent to access sensitive information
Why choose us for cyber incident response
Our customers
Latest advisories
Frequently asked questions
How can Cythera help us proactively manage cyber threats?
Absolutely. We assist with readiness as well as response, delivering proactive services like Managed Detection and Response, and Digital Forensics and Incident Response (DFIR), Incident Response Planning and Tabletop Exercises.
How quickly can Cythera begin engagement?
When incidents happen, acting fast is critical. We're ready to assess the situation, provide urgent containment guidance, and help preserve key evidence from the start. We operate 24x7 to support customers.
What kinds of cyber incidents does Cythera investigate?
Whether you've been hit with ransomware, suspect data leakage, or need help validating a potential breach, our team is ready to assist. We handle everything from phishing and account takeovers to insider threat detection.
What's the outcome at the end of the investigation?
Our incident report clearly outlines the sequence of events, affected assets, and root causes. We also provide straightforward guidance to close the gaps and reinforce your defences.
Will daily business operations be impacted?
We work to keep everything running smoothly. Our team will coordinate with yours to avoid disruption and provide upfront notice if any activity may temporarily impact systems or users.
Talk to an expert
(1300 298 437)
120 Spencer St
Melbourne, VIC 3000
Brisbane, QLD 4000
Sydney NSW 2000
51 Shortland Street,
Auckland 1010 New Zealand
10 Brandon Street
Wellington 6011 New Zealand