Posts

The latest dump from Wikileaks alleges the CIA installed custom router firmware on unsuspecting targets in order to spy on internet activity. Source: Malware Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’ Program

Microsoft patched 95 vulnerabilities today, including two under attack. Source: Malware Microsoft Patches Two Critical Vulnerabilities Under Attack

Zusy malware installs when victims hover over an opened PowerPoint file – no clicking needed. Source: Malware Zusy Malware Installs Via Mouseover – No Clicking Required

QakBot, a worm-like, information-stealing strain of malware is back and locking users out of their Active Directory accounts. Source: Malware QakBot Returns, Locking Out Active Directory Accounts

We had a number of great questions during CyberUK2017, and some of those…

The market for automated credential stuffing tools is growing fast, because of a record number of breaches. Source: Malware Password Breaches Fueling Booming Credential Stuffing Business

Attackers can remotely execute code on targeted systems via specially crafted subtitle files for videos. Source: Malware Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution

A worm called EternalRocks has been spreading seven Windows SMB exploits leaked by the ShadowBrokers, including EternalBlue, which was used to spread WannaCry. Source: Malware EternalRocks Worm Spreads Seven NSA SMB Exploits

We’re often asked questions that sound something like “can you recommend <a thing>…

In the second blog about the NCSC’s IT system we focus on our…