Sonatype researchers uncover critical vulnerabilities in picklescan. Learn how these flaws impact AI model security, Hugging Face, and… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Author: Deeba Ahmed
UNC3886 hackers target Juniper routers with custom backdoor malware, exploiting outdated systems for stealthy access and espionage. Learn how to stay protected. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
ISACA London Chapter members demand e-voting system investigation over security and privacy concerns – Read More –
iOS 18.3.2 patches actively exploited WebKit flaw, addressing critical security risks for users – Read More –
In a new round of cuts since Donald Trump became president, 100 people working with the US Cybersecurity and Infrastructure Agency saw their contracts terminated – Read More –
Davis Lu had planted malicious Java code onto his employer’s network that would cause “infinite loops” that would ultimate result in the server crashing or hanging. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits – The Hacker News
The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper Networks as part of a campaign designed to deploy custom backdoors, highlighting their ability to focus on internal networking infrastructure. “The backdoors had varying custom capabilities, including active and passive backdoor functions, as well as an embedded script … Read More “Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits – The Hacker News” »
San Jose, United States / California, 12th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Tel Aviv, Israel, 12th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Surging machine identities, faster threat detection and fewer vulnerabilities are shaping cloud security according to a new report – Read More –
Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap. – Read More – NCSC Feed
We caught up with George Brown, founder of PORGiESOFT, about his first few weeks in NCSC For Startups… – Read More – NCSC Feed
Saj Huq of Plexal explains why collaboration with the NCSC brings opportunities to the cyber security sector. – Read More – NCSC Feed
How startups can make the most of their time when pitching to cyber security experts. – Read More – NCSC Feed
New guidance from the NCSC helps system and risk owners plan their migration to post-quantum cryptography (PQC). – Read More – NCSC Feed
The ‘Motivating Jenny’ project is helping to change the conversation about security in software development. – Read More – NCSC Feed
Avoiding common problems when moving to the cloud. – Read More – NCSC Feed
Why trying to avoid trusting the KMS doesn’t make sense (and other common misconceptions). – Read More – NCSC Feed
Mandiant revealed that Chinese espionage actor UNC3886 has deployed modified versions of the TinyShell backdoor across multiple Juniper OS routers – Read More –
Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability. – Read More – NCSC Feed
NCSC CEO Felicity Oswald shares reflections on keeping the 2024 General Election safe. – Read More – NCSC Feed
What you need to know before buying artificially intelligent security products – Read More – NCSC Feed
Launching a new Industry Assurance scheme aimed at helping the UK’s small organisations. – Read More – NCSC Feed
The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it. – Read More – NCSC Feed
Threat intelligence firm GreyNoise is warning of a “coordinated surge” in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities spanning multiple platforms. “At least 400 IPs have been seen actively exploiting multiple SSRF CVEs simultaneously, with notable overlap between attack attempts,” the company said, adding it observed the activity on March 9, 2025. The countries … Read More “Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack – The Hacker News” »
Large Language Models are an exciting technology, but our understanding of them is still ‘in beta’. – Read More – NCSC Feed
Microsoft’s March 2025 Patch Tuesday fixes six actively exploited zero-day vulnerabilities, including critical RCE and privilege escalation flaws. Learn how these vulnerabilities impact Windows systems and why immediate patching is essential. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
API attacks are constantly on the rise, with a recent alarming study showing that 59% of organizations give… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
How ‘small but actionable’ insights can improve behaviours and decision making. – Read More – NCSC Feed
SMS and telephone guidance updated to address the rise in Artificial Inflation of Traffic (AIT). – Read More – NCSC Feed
New ACD services developed to help protect SMEs from the harms caused by cyber attacks. – Read More – NCSC Feed
We’ve been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs Lost, Jobs Gained: Workforce Transitions in a Time of Automation, predicting that by 2030, 375 million workers would need to find new jobs or risk being displaced by AI and automation. Queue … Read More “Pentesters: Is AI Coming for Your Role? – The Hacker News” »
This report outlines the risks associated with the use of official and third party app stores. – Read More – NCSC Feed
Assessing the security of network equipment. – Read More – NCSC Feed
The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made. – Read More – NCSC Feed
Cyber incident trends in the UK with guidance on how to defend against, and recover from them. – Read More – NCSC Feed
How to limit the effectiveness of tools commonly used by malicious actors. – Read More – NCSC Feed
Key findings from the 5th year of the Active Cyber Defence (ACD) programme. – Read More – NCSC Feed
The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme. – Read More – NCSC Feed
Key findings and full report from the 6th year of the Active Cyber Defence (ACD) programme. – Read More – NCSC Feed
The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe. – Read More – NCSC Feed
The second report examining how the NCSC’s ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem. – Read More – NCSC Feed
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles. – Read More – NCSC Feed
Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes. – Read More – NCSC Feed
This guidance is aimed at service owners and security specialists involved in the provision of online services. – Read More – NCSC Feed
Microsoft on Tuesday released security updates to address 57 security vulnerabilities in its software, including a whopping six zero-days that it said have been actively exploited in the wild. Of the 56 flaws, six are rated Critical, 50 are rated Important, and one is rated Low in severity. Twenty-three of the addressed vulnerabilities are remote … Read More “URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days – The Hacker News” »
Microsoft has fixed seven zero-days this Patch Tuesday, including one not currently being actively exploited – Read More –
There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each. – Read More – NCSC Feed
Guidance for organisations wishing to deploy products that use IPsec. – Read More – NCSC Feed
How to reduce the likelihood of unauthorised content appearing within your organisation’s social media channels. – Read More – NCSC Feed