Serviceteam IT Security News

Now published: the NCSC’s new guidance on risk management for cyber security

A few weeks ago, we said that we'd be publishing the first phase of our...
Serviceteam IT Security News

Permissions Flaw Found Azure AD Connect

A permissions flaw in Microsoft’s Azure AD Connect software could allow a rogue...
Serviceteam IT Security News

19-Year-Old TLS Vulnerability Weakens Modern Website Crypto

New research shows how an old vulnerability called ROBOT can be exploited using...
Serviceteam IT Security News

The fundamentals of risk

This section focuses on the fundamental principles of risk management. Here, we won’t...
Serviceteam IT Security News

Understanding component-driven risk management

Component-driven risk assessments are the most mature and common types of assessment within the...
Serviceteam IT Security News

Understanding system-driven risk management

This sections explains the core concepts involved in system-driven risk analyses, what value...
Serviceteam IT Security News

Variety in risk information

Risk information is any information which can influence a decision. Some organisations have a tendency to...
Serviceteam IT Security News

Introducing component-driven and system-driven risk assessments

This section outlines two different but complementary types of risk management. Click here...
Serviceteam IT Security News

Get the basics right: risk management principles for cyber security

The NCSC's risk management guidance is aimed at a broad range of organisations,...
Serviceteam IT Security News

Introduction to the risk management for cyber security guidance

This page introduces the intent behind the NCSC's risk management guidance, and how to best...
Serviceteam IT Security News

Microsoft December Patch Tuesday Update Fixes 34 Bugs

Microsoft patched 34 vulnerabilities in all on Tuesday with most of the bugs...
Serviceteam IT Security News

New Spider Ransomware Comes With 96-Hour Deadline

A ransomware campaign targeting the Balkans comes with a 96-hour deadline and includes...
Serviceteam IT Security News

Leftover Debugger Doubles as a Keylogger on Hundreds of HP Laptop Models

HP released an update that fixes debugger code that could allow an attacker...
Serviceteam IT Security News

Secure development is everyone's concern

Genuine security benefits can only be realised when delivery teams weave security into...
Serviceteam IT Security News

Plan for security flaws

All but the very simplest software is likely to contain bugs, some of...
Serviceteam IT Security News

Secure the build and deployment pipeline

Continuous integration, delivery and deployment are modern approaches to the building, testing and...
Serviceteam IT Security News

Continually test your security

Testing during software development is well recognised as good practice. It helps you...
Serviceteam IT Security News

Protect your code repository

Your code is only as secure as the systems used to create it....
Serviceteam IT Security News

Secure your development environment

There is sometimes a perceived conflict between security and usability. This situation is...
Serviceteam IT Security News

Produce clean & maintainable code

If your code lacks consistency, is poorly laid out and undocumented, you're adding...
Serviceteam IT Security News

Keep your security knowledge sharp

Creating code that is capable of withstanding attack requires an understanding of attack...
Serviceteam IT Security News

Apple Fixes Flaw Impacting HomeKit Devices

Apple said it has fixed an undisclosed vulnerability in its HomeKit framework that...
Serviceteam IT Security News

Banking Apps Found Vulnerable to MITM Attacks

Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile...
Serviceteam IT Security News

Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones

As part of its December Android and Pixel/Nexus security updates, Google has issued...
Serviceteam IT Security News

TeamViewer Rushes Fix for Permissions Bug

TeamViewer says it has issued a hotfix to address a bug that allows...
Serviceteam IT Security News

Developers Targeted in ‘ParseDroid’ PoC Attack

A proof of concept attack developed by researchers target users of the development...
Serviceteam IT Security News

Ursnif Trojan Adopts New Code Injection Technique

Researchers have found a variant of Ursnif Trojan they said is a “v3...
Serviceteam IT Security News

Managing supply chain risk in cloud-enabled products

There’s been a lot of speculation about foreign involvement in the UK supply...
Serviceteam IT Security News

CyBOK – the scope

If you missed the earlier blogs and don't know what CyBOK is -...
Serviceteam IT Security News

Managing the risk of cloud-enabled products

Organisations are increasingly deploying software to both servers and end user devices that...