
'WannaCry' ransomware: guidance updates
Over the weekend, as we learnt more about the WannaCry ransomware, we published...

Ransomware: 'WannaCry' guidance for enterprise administrators
The NCSC is currently working with organisations and partners in the UK affected...

Ransomware: 'WannaCry' guidance for home users and small businesses
The NCSC is currently working with organisations and partners in the UK affected...

Ransomware: Latest NCSC Guidance
The NCSC are aware of a ransomware campaign relating to version 2 of...

Phishing: guidance for political parties and their staff
This guidance has been produced for individuals and IT departments within political parties...

Finding the kill switch to stop the spread of ransomware
Media reports today have rightly praised the efforts of MalwareTech to tackle the...

Leaked NSA Exploit Spreading Ransomware Worldwide
Attackers behind today’s WannaCry ransomware outbreak in Europe are spreading the malware using the EternalBlue exploit leaked by the ShadowBrokers.
Source: Malware Leaked NSA Exploit Spreading Ransomware Worldwide

NHS across England hit by large-scale cyber-attack
A number of hospitals have been hit by a large scale cyber attack, NHS England has confirmed. We're aware of at least eleven Trusts that have been affected.

Internet edge device security
Introduction An internet edge router is the device which provides your network with its ‘window...

Even Jedi can't achieve Password Perfection
World Password Day arrives again on May 4th - an auspicious date, in so many...

Google Phishing Attack: users hit with sophisticated phishing
It's not at all a surprise that Google Mail users have today been hit by a massive Phishing attack. Given the rise of exploits being sourced using Google platform services, such as the GOOGLE RECAPTCHA BYPASS and the malware CARBANAK USING GOOGLE SERVICES it was inevitable.

The Secure by Default Partnership Programme 2017
Our CyberUK in Practice conference in Liverpool saw those public sector organisations who...

Auto Lender Exposes Loan Data For Up To 1 Million Applicants
A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online.
Source: Cloud Security Auto Lender Exposes Loan Data For Up To 1 Million Applicants

IBM Ships USBs for Storewize Infected with Malware
The malware is a dropper discovered by Kaspersky Lab as Reconyc. The dropper is a cybercrime tool used to install other malware on infected computers. IBM said the drives that were infected have a part number 01AC585; Storwize systems with serial numbers beginning with 78D2 aren't compromised.

xDedic Market Spilling Over With School Servers, PCs
In its research, Flashpoint said the United States, Germany, and Ukraine appear to be the most frequently targeted countries. The most exploited sectors are education, followed by healthcare, legal, aviation, and government. Least vulnerable…

Hard Target: Fileless Malware
Researchers say fileless in-memory malware attacks have become a major nuisance to businesses and have become even harder to detect and defend.
Source: Malware Hard Target: Fileless Malware

Low-Cost Ransomware Service Discovered
A new ransomware-as-a-service called Karmen appeals to ransomware newbies with a low price, easy setup and developer updates.
Source: Malware Low-Cost Ransomware Service Discovered

New Chrome OS guidance released
We’ve just published guidance for Chrome OS on our website. If you’ve not come across Chrome...

IHG Confirms Second Credit Card Breach Impacting 1,000-Plus Hotels
InterContinental Hotels Group said on Friday that it found malware designed to access payment card data at more than 1,000 of its hotels.
Source: Malware IHG Confirms Second Credit Card Breach Impacting 1,000-Plus Hotels

CyberFirst Girls prove inspiration for all
In Ian Levy’s recent blog, he finished by saying it would be good to...

The Cyber Risk Manager's Toolbox – A Masterclass
In Cyber Security, risk management is sometimes seen as an exercise in applying...

Ever wondered how a cyber crime gang operates?
Most people are aware of phishing emails, and the risk of clicking on...

Researcher Warns SIEMs Are Weak Link In Network Security Chain
Security information and event management solutions are supposed to boost security, but researchers say the network analysis tools are ripe attack targets.
Source: Cloud Security Researcher Warns SIEMs Are Weak Link In Network Security Cha…

UK firms targeted by China-based ‘systematic’ hacking operation
A China-based cyber gang has compromised UK firms as part of a "systematic" global hacking operation, a new report has revealed. The attacks were found to have breached a wide variety of secret data ranging from personal data to intellectual…

Industry Braces for Repeal of ISP Privacy Rules
Businesses say overturning one of the nation’s strongest internet privacy protection rules will deal a blow to data privacy, security and integrity for businesses and consumers alike.
Source: Cloud Security Industry Braces for Repeal of ISP…

NCSC IT: Networking in the cloud
Hopefully you've arrived here having read the other blogs in the series. If...

CyberUK: the unsung heroes of cyber security
Image credit: Hannah from Manchester School of Art working with www.naimuri.com It's hard...

CyberUK by the numbers
Input metrics are a piece of cake. It’s easy to measure how much...

What does the NCSC think of password managers?
People keep asking the NCSC if it's OK for them to use password managers (sometimes...

Developers need help too
For years, security research has been focused around technology. But now - finally...