Avoiding crisis mismanagement
Avoiding crisis mismanagement Every day, an eclectic range of cyber attacks take place across the UK. No two attacks are...
Avoiding crisis mismanagement Every day, an eclectic range of cyber attacks take place across the UK. No two attacks are...
Mythbusting cloud key management services The NCSC’s recently-updated cloud security guidance includes a new section on how to configure and...
ACD the 5th Year: report now available to download The aim of the NCSC's Active Cyber Defence (ACD) programme is...
Securing the cloud (by design *and* by default) In any conversation about cloud security, it won’t take long before someone...
Supply chain cyber security: new guidance from the NCSC Many of us rely on suppliers to deliver products, systems, and...
Protect your customers to protect your brand We're pleased to publish a brace of documents that will help organisations to...
The security benefits of modern collaboration in the cloud When using cloud services, it is important to balance the need...
Introducing our new machine learning security principles Artificial intelligence (AI) and machine learning (ML) systems are increasingly used in every...
A popular British hacker was charged by the U.S. authorities for allegedly running the ‘The Real Deal’ dark web marketplace....
The OpenSSL Project announced an upcoming update to address a critical vulnerability in the open-source toolkit. The OpenSSL Project announced...
We found malicious samples attempting to steal Amazon Elastic Compute Cloud (EC2) Workloads' access keys and tokens via typosquatting and...
Ransomware attacks have been on the rise in recent years, and hospitals are increasingly becoming targets. In many cases, these...
International ticketing services company See Tickets disclosed a data breach that exposed customers’ payment card details. Ticketing service company See...
US authorities charged a Ukrainian man with computer fraud for allegedly infecting millions of computers with Raccoon Infostealer. The US...
Cisco warns of active exploitation attempts targeting two vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows. Cisco is...
VMware addressed a critical remote code execution vulnerability in VMware Cloud Foundation tracked as CVE-2021-39144. VMware has released security updates...
The ongoing shift of traditional IT functions to the cloud brings new cyber risks for enterprises. Discover three current cloud...
Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion...
A high-severity vulnerability, tracked as CVE-2022-35737, has been disclosed in the SQLite database library. The security expert Andreas Kellas detailed...
Researchers reported that threat actors used 2 PoS malware variants to steal information about more than 167,000 credit cards. Cybersecurity...
The Hive ransomware gang, which claimed the responsibility for the Tata Power data breach, started leaking data. On October 14,...
A new malvertising campaign, code-named Dormant Colors, is delivering malicious Google Chrome extensions that hijack targets’ browsers. Researchers at Guardio...
Apple released security updates that addressed the ninth zero-day vulnerability actively exploited in the wild since the start of the...