Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defend against it
Category: NCSC
Category Added in a WPeMatico Campaign
NCSC: Leave passwords in the past – passkeys are the future
Passkeys are the more secure and user-friendly login method and should be the default authentication option for consumers.
World-first NCSC-engineered device secures vulnerable display links
SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections.
Cyber chief: UK faces “perfect storm” for cyber security
As the technology landscape develops, the definition of cyber security is expanding with it.
UK exposes Russian military intelligence hijacking vulnerable routers for cyber attacks
New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.
APT28 exploit routers to enable DNS hijacking operations
Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and authentication tokens.
NCSC warns of messaging app targeting
The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.
Vulnerability affecting F5 BIG-IP APM
The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager.
Vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway
UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway.
NCSC CEO: Seize ‘disruptive’ vibe coding opportunity to make software more secure
Dr Richard Horne delivered a keynote about cyber risks and opportunities at the RSAC Conference in San Francisco