NCSC IT: Installing software updates without breaking things
Software updates can be a controversial topic. We all know it’s important to...
Olympic Destroyer: A False Flag Confusion Bomb
Researchers say the case of Olympic Destroyer malware show how threat actors can...
Lookout: Dark Caracal Points To APT Actors Moving To Mobile Targets
Lookout researchers discussed Dark Caracal's implications for APT actors in the mobile space...
Fixing all the things
The Department for Digital, Culture, Media and Sport (DCMS) has just published the...
Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months
Report outlines lucrative rise of nefarious cyrptoming groups and their complex new business...
In Wake of ‘Biggest-Ever’ DDoS Attack, Experts Say Brace For More
This week's DDoS attack against GitHub is a harbinger of attacks to come...
Bug in HP Remote Management Tool Leaves Servers Open to Attack
Firmware versions of HPE’s remote management hardware iLO3 have an unauthenticated remote denial...
Ad Network Circumvents Ad-Blocking Tools To Run In-Browser Cryptojacker Scripts
Researchers say cyrptojackers are bypassing ad-blocking software in an attempt to run in-browser...
We’re trying to cure cancer, why would anyone attack us?
You heard on the news this morning about another big cyber crime attack....
Massive Malspam Campaign Targets Unpatched Systems
Morphisec said that it has detected several malicious word documents – part of...
Apple Tackles Cellebrite Unlock Claims, Sort Of
In the wake of claims an Israeli company Cellebrite has developed an unlocking...
The Trouble with Phishing
Phishing has become one of the most talked about threats in cyber security and...
FBI Warns of Spike in W-2 Phishing Campaigns
A recent FBI public service advisory warned of an increase in reports of...
Cryptojacking Attack Found on Los Angeles Times Website
A security researcher found Coinhive code hidden on a Los Angeles Times’ webpage...
Year-Old Coldroot RAT Targets MacOS, Still Evades Detection
Researchers are warning users about the Coldroot remote access Trojan that is going...
Not perfect, but better: improving security one step at a time
If you're anything like me, at every family and/or friends' get-together you'll inevitably...
Reported Critical Vulnerabilities In Microsoft Software On the Rise
Avecto researchers say removing admin rights from users would mitigate many of the...
Word-based Malware Attack Doesn’t Use Macros
Malicious e-mail attachments used in this campaign don’t display any warnings when opened...
Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram
It's just the latest reported vulnerability for the secure messaging application. ...
Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update
One of the bugs could allow a successful attack simply by a user...
'Meltdown' and 'Spectre' guidance
What are Meltdown/Spectre? 'Meltdown' and 'Spectre' are two related, side-channel attacks against modern...
Home user guidance to manage processor vulnerabilities ‘Meltdown’ and ‘Spectre’
What are Meltdown/Spectre? ‘Meltdown' and 'Spectre' are two security flaws affecting microprocessors. Actions...
Romance Scams Drive Necurs Botnet Activity in Run Up to Valentine’s Day
Emails try to get recipients to share revealing photos of themselves so scammers...
‘Olympic Destroyer’ Malware Behind Winter Olympics Cyberattack, Researchers Say
The malware's sole purpose was to take down systems, not steal data, Cisco...
4,500 young women race to complete CyberFirst Girls online challenge
We have been blown away by the fantastic response to this year’s CyberFirst Girls...
U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner
The attack could have been averted through a technique called subresource integrity, according...
Lenovo Warns Critical WiFi Vulnerability Impacts Dozens of ThinkPad Models
Lenovo issued a security bulletin Friday warning customers of two previously disclosed critical...
Cisco Confirms Critical Firewall Software Bug Is Under Attack
Cisco has issued patches for the vulnerability, which could be up to seven...
Introducing the Mitigating Malware and Preventing Lateral Movement Guidance
Last year, following the global WannaCry incident in May 2017, the NCSC published...
Apple Downplays Impact of iBoot Source Code Leak
Apple said the leak of its iBoot source code will have little...

