
Pharmaceutical Giant Still Feeling NotPetya’s Sting
Merck, among the world’s largest pharmaceutical companies, said in its quarterly earnings report last week that it has still not fully recovered from the June 27 attack.

End User Devices: VPNs
A Virtual Private Network (VPN) is a mechanism for securely connecting devices or...

The dragons are actually not that ferocious…
At CyberUK earlier this year, along with colleagues in DCMS, we ran a Dragons' Den...

Google Study Quantifies Ransomware Profits
A ransomware study released Google revealed the malware earned criminals $25 million over the past two years.

Building the Cyber Security Body of Knowledge
Cyber security encompasses a wide range of disciplines, but its relative youth means...

I'm gonna stop you, little phishie…
Some organisations put a lot of effort into training their staff to detect...

Diversity in technology: a challenge from the NCSC
Quotes from me noting some of the difficulties that women working in technology...

Customer success stories at the NCSC
The eagle-eyed amongst you may have spotted some new additions to the NCSC...

Happy 1st Birthday StSG!
How they grow up fast. As we’re approaching the 1st birthday of the Sociotechnical Security...

"Do what I mean!" – time to focus on developer intent
Developers are undoubtedly on the front line when it comes to securing software....

CyberFirst Girls Competition: Could 2018 be your year?
The popularity of the 2017 CyberFirst Girls competition, and the outstanding abilities demonstrated...

Web Check — helping you to secure your public sector websites
The UK public sector has a huge digital estate to manage, and it...

Free Certs Come With a Cost
Leading certificate authority Let’s Encrypt is facing criticism that its rapid growth and eagerness to encrypt internet communications is happening at a cost.

Experts Warn Too Often AWS S3 Buckets Are Misconfigured, Leak Data
An analysis of Amazon Web Services storage containers reveals troubling trend of misconfigured S3 buckets that leak data.

To AV, or not to AV?
"Do I need to install AV?" is one of the questions many...

Decryption Key to Original Petya Ransomware Released
The key to decrypt the original Petya ransomware has been reportedly released by the ransomware’s author.

CopyCat Malware Infected 14M Android Devices, Rooted 8M, in 2016
Over the course of two months last year the Copycat malware infected 14 million Android devices and rooted more than half of them, roughly eight million devices.

Microsoft Issues ‘Important’ Security Fix for Azure AD Connect
Microsoft is warning customers of an “important” update to its Azure AD Connect service that could allow for an elevation of privilege attack against affected systems.

Securing Agile Delivery: Collaboration is Crucial
CyberUK may seem like ancient history now but I hope we gave you lots...

LinkedIn 2012 hack: what you need to know
On Friday the NCSC published a summary of guidance for people concerned about the 2012...

Password guidance summary: how to protect against password-guessing attacks
Recently, the NCSC have seen an increase in a number of incidents, and also...

Microsoft Says Fireball Threat ‘Overblown’
Check Point has toned down its initial estimates on the number of Fireball malware infections from 250 million machines and 20 percent of corporate networks to 40 million computers.
Source: Malware Microsoft Says Fireball Threat ‘Overblo…

Breach at UK.gov’s Cyber Essentials scheme exposes users to phishing attacks
The operation behind the UK government's Cyber Essentials scheme has suffered a breach exposing the email addresses of registered consultancies, it told them today.

Who are the cyberists?
You’ll have noticed that as part of the CyberFirst initiative we’ve been using the term...

IoT Malware Activity Already More Than Doubled 2016 Numbers
The number of new malware samples in the wild this year targeting connected internet-of-things (IoT) devices has already more than doubled last year’s total.
Source: Malware IoT Malware Activity Already More Than Doubled 2016 Numbers

Someone Failed to Contain WannaCry
As reports of the NSA officially connecting WannaCry to North Korea surface, experts are saying developers failed to contain the ransomware before it was ready for deployment.
Source: Malware Someone Failed to Contain WannaCry

Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’ Program
The latest dump from Wikileaks alleges the CIA installed custom router firmware on unsuspecting targets in order to spy on internet activity.
Source: Malware Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’…

Microsoft Patches Two Critical Vulnerabilities Under Attack
Microsoft patched 95 vulnerabilities today, including two under attack.
Source: Malware Microsoft Patches Two Critical Vulnerabilities Under Attack

Zusy Malware Installs Via Mouseover – No Clicking Required
Zusy malware installs when victims hover over an opened PowerPoint file – no clicking needed.
Source: Malware Zusy Malware Installs Via Mouseover – No Clicking Required

QakBot Returns, Locking Out Active Directory Accounts
QakBot, a worm-like, information-stealing strain of malware is back and locking users out of their Active Directory accounts.
Source: Malware QakBot Returns, Locking Out Active Directory Accounts