
NCSC IT: how the NCSC chose its cloud services
So far in the series discussing how the NCSC built its IT we’ve talked about...

Apple Releases Spectre Patches for Safari, macOS and iOS
Apple releases patches addressing the Spectre vulnerability impacting its macOS, iPhone, iPad and...

Experts Weigh In On Spectre Patch Challenges
Mitigating Spectre and Meltdown flaws won't be easy, but experts say exploits targeting...

Google Play Removes 22 Malicious ‘LightsOut’ Apps From Marketplace
Google removed 22 malicious adware apps ranging from flashlights, call recorders to wifi...

Announcing the CyberFirst Girls Competition
The NCSC - as part of GCHQ - are working hard to...

Download the latest NCSC Glossary infographic
Throughout December we tweeted out some new additions to the NCSC glossary. Our...

Vendors Share Patch Updates on Spectre and Meltdown Mitigation Efforts
Intel, Amazon, ARM, Microsoft and others have shared patch updates to keep customers...

Intel In Security Hot Seat Over Serious CPU Design Flaw
Intel is grappling with a processor design flaw impacting CPUs used in Linux,...

MacOS LPE Exploit Gives Attackers Root Access
A researcher with the Twitter handle ‘Siguza’ published details of a macOS local...

Forever 21 Says PoS Systems Exposed Customer Data for 8 Months
Fashion retailer updates disclosure on 2017 attack, says hackers targeted point-of-sale terminals that...

VMware Issues 3 Critical Patches for vSphere Data Protection
VMware released three patches fixing critical vulnerabilities affecting its vSphere cloud computing virtualization...

Leaky RootsWeb Server Exposes Some Ancestry.com User Data
Ancestry.com closes parts of its community-driven genealogy site RootsWeb as it investigates a...

Mozilla Patches Critical Bug in Thunderbird
Mozilla has patched one critical vulnerability in its Thunderbird email client along with...

Nissan Canada Finance Notifies 1.1 Million of Data Breach
Nissan Canada Finance notified 1.13 million customers on Thursday of a data breach...

NCSC IT: Don’t leave your Windows open this Christmas
At this time of year, the people of Iceland traditionally place their best...

Crooks Switch from Ransomware to Cryptocurrency Mining
The group behind the VenusLocker ransomware have switched to cryptocurrency mining Monero. ...

CHM Help Files Deliver Brazilian Banking Trojan
Brazilian firms are the latest targets in a spam campaign delivering CHM help...

Using passwords to protect your data
Your laptops, computers, tablets and smartphones will contain a lot of your own...

Project Zero Chains Bugs for ‘aPAColypse Now’ Attack on Windows 10
Google’s Project Zero team dubs a new WPAD-related attack as an “aPAColypse Now”...

U.S. Government Blames North Korea for WannaCry
The United States government is officially blaming North Korea for the WannaCry ransomware...

Using TLS to protect data
This guidance outlines how to configure the services that must be able to...

Triton Malware Targets Industrial Control Systems in Middle East
Malware intended for a “high-impact” attack against safety systems likely would of caused...

Now published: the NCSC’s new guidance on risk management for cyber security
A few weeks ago, we said that we'd be publishing the first phase of our...

Permissions Flaw Found Azure AD Connect
A permissions flaw in Microsoft’s Azure AD Connect software could allow a rogue...

19-Year-Old TLS Vulnerability Weakens Modern Website Crypto
New research shows how an old vulnerability called ROBOT can be exploited using...

Understanding system-driven risk management
This sections explains the core concepts involved in system-driven risk analyses, what value...

Variety in risk information
Risk information is any information which can influence a decision. Some organisations have a tendency to...

Introducing component-driven and system-driven risk assessments
This section outlines two different but complementary types of risk management. Click here...

Get the basics right: risk management principles for cyber security
The NCSC's risk management guidance is aimed at a broad range of organisations,...

Introduction to the risk management for cyber security guidance
This page introduces the intent behind the NCSC's risk management guidance, and how to best...