
II. Establish control
Once you gain better control of your supply chain you will be able...

A2. Risk management
Principle The organisation takes appropriate steps to identify, assess and understand security risks...

The NIS Guidance Collection
Introduction The EU Directive on the security of network and information systems (NIS)...

Assessing supply chain security
The idea is to give you some concrete examples of good and bad...

C2. Proactive security event discovery
Principle The organisation detects, within networks and information systems, malicious activity affecting, or...

Example supply chain attacks
Outlined below are examples of supply chain attacks that illustrate the challenges organisations face. Attacks...

B4. System security
Principle Network and information systems and technology critical for the delivery of essential...

Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners
Lenovo said nearly a dozen ThinkPad and ThinkCentre laptops contain a hardcoded password...

Firefox, Chrome Patch Vulnerabilities, Add Security Features
Dueling browsers, Mozilla Firefox and Google Chrome, have patched bugs and beefed up...

Skype, Slack and Signal Vulnerable to Critical Framework Bug
The team behind the popular open-source framework Electron warns a remote code execution...

Intel Halts Spectre/Meltdown Patching for Broadwell and Haswell Systems
Widespread reports of reboot issues on some Intel systems force the chip giant...

Introduction to identity and access management
Introduction If identity and access management procedures and controls are badly designed or...

CYBERUK 2018
Registration is now open for the NCSC's flagship annual cyber security conference, which will...

Hacker Infects Gas Pumps with Code to Cheat Customers
Russian authorities have broken up a crime ring involving a hacker and willing...

OnePlus Confirms Credit Card Breach Impacted Up to 40,000 Customers
The breach is the latest piece of bad publicity for the popular Chinese...

New Dridex Variant Emerges With An FTP Twist
A recently discovered Dridex campaign had a few peculiar characteristics, including the use...

Apple Preps ChaiOS iMessage Bug Fix, Report
A so-called ‘text bomb’ flaw in Apple’s iPhone and Mac computers that...

Sprawling Mobile Espionage Campaign Targets Android Devices
A massive mobile espionage campaign has been collecting troves of sensitive personal information...

Intel Says Firmware Fixes for Spectre and Meltdown Affecting Newer Chips
Intel says its firmware updates for Meltdown and Spectre are causing additional reboots...

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware
Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware...

Oracle Ships 237 Fixes in Latest Critical Patch Update
Enterprise applications from Oracle and others could be becoming juicier targets for attackers....

Potent Skygofree Malware Packs ‘Never-Before-Seen’ Features
Researchers have discovered Android malware with spy capabilities never seen before such as...

Google Chrome Once Again Target of Malicious Extensions
Researchers at network security vendor ICEBRG recently discovered four malicious extensions in the...

It’s back! The CyberFirst Girls Competition 2018
I think it’s fair to say I did not expect to be running...

Lenovo Patches Networking OS Vulnerability Dating Back to 2004
A bug in Lenovo’s Enterprise Networking Operating System could allow an attacker to...

Intel AMT Loophole Allows Hackers to Gain Control of Some PCs in Under a Minute
Researchers say an unprotected Management Engine BIOS Extension can allow an attacker the...

Apps Exposing Children to Porn Ads Booted From Google Play
Researchers identified 60 apps on Google Play infected with AdultSwine malware that in...

WhatsApp Downplays Damage of a Group Invite Bug
WhatsApp said that claims that infiltrators can add themselves to an encrypted group...

Microsoft January Patch Tuesday Update Fixes 16 Critical Bugs
Thanks to Meltdown and Spectre, January has already been an extremely busy month...

Anti-Virus Updates Required Ahead of Microsoft’s Meltdown, Spectre Patches
Microsoft is pausing the rollout of Windows Meltdown and Spectre patches until hosted...