Director GCHQ on global security amid war in Ukraine
D In a speech delivered at the Australian National University, Canberra, Director GCHQ Sir Jeremy Fleming discusses the resolve of...
D In a speech delivered at the Australian National University, Canberra, Director GCHQ Sir Jeremy Fleming discusses the resolve of...
N Following Russia’s unprovoked, premeditated attack on Ukraine, the National Cyber Security Centre continues to call on organisations in the...
E The NCSC is seeking Expressions of Interest (EOI) from organisations interested in applying to become a Delivery Partner for...
U The UK has today joined international partners to share updated mitigation advice against Russian state-sponsored and criminal cyber threats....
N UK and international allies share details of the top 15 vulnerabilities routinely exploited by malicious actors in 2021 Advisory...
I Top U.S. security officials among the guest speakers at CYBERUK 2022 The National Cyber Security Centre – a part...
R Russia has been behind a series of cyber attacks since the start of the renewed invasion of Ukraine, it...
C Whole of society approach to cyber security will be theme of the NCSC’s conference in Wales Sessions will cover...
S Request from the National Cyber Security Centre and the Information Commissioner’s Office follows rise in ransomware payments being made...
N More than 2.7 million scams removed from the internet in 2021 thanks to GCHQ’s National Cyber Security Centre ramping...
U Joint advisory sets out practical steps service providers and their customers can take to protect themselves High-profile supply chain...
N National Cyber Security Centre develops capability with industry partners which protects UK citizens from scam websites Fraudulent sites will...
N UK organisations offered guidance on maintaining cyber security staff resilience as threat from Russia-Ukraine conflict remains heightened Guidance is...
Solicitors urged to help stem the rising tide of ransomware payments Request from the National Cyber Security Centre and the...
Microsoft announced the general availability of a feature called Autopatch that automatically updates Windows and Office software. Microsoft announced the general availability...
Researchers investigated cloud-based cryptocurrency mining attacks targeting GitHub Actions and Azure VMs. Researchers from Trend Micro published a report that...
E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But...
How to secure your private 5G networks; The challenge of complex ecosystem in DX. If you like the site, please...
In this blog entry, we discuss how open-source code has been subjected to protest-driven code modifications by its maintainers or...
The importance of proof of “security” concepts in private 5G networks: Are verifications of system operations and new functions sufficient...
Threat actors used a fake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft...
A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign...
If regulators have their way, data transfers from Facebook and Instagram between Europe and the United States could stop this...
BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate...