From the cyber proliferation threat all the way to Pall Mall – NCSC Feed
The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it. – Read More – NCSC Feed
The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it. – Read More – NCSC Feed
Large Language Models are an exciting technology, but our understanding of them is still ‘in beta’. – Read More – NCSC Feed
How ‘small but actionable’ insights can improve behaviours and decision making. – Read More – NCSC Feed
SMS and telephone guidance updated to address the rise in Artificial Inflation of Traffic (AIT). – Read More – NCSC Feed
New ACD services developed to help protect SMEs from the harms caused by cyber attacks. – Read More – NCSC Feed
This report outlines the risks associated with the use of official and third party app stores. – Read More – NCSC Feed
Assessing the security of network equipment. – Read More – NCSC Feed
The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made. – Read More – NCSC Feed
Cyber incident trends in the UK with guidance on how to defend against, and recover from them. – Read More – NCSC Feed
How to limit the effectiveness of tools commonly used by malicious actors. – Read More – NCSC Feed
Key findings from the 5th year of the Active Cyber Defence (ACD) programme. – Read More – NCSC Feed
The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme. – Read More – NCSC Feed
Key findings and full report from the 6th year of the Active Cyber Defence (ACD) programme. – Read More – NCSC Feed
The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe. – Read More – NCSC Feed
The second report examining how the NCSC’s ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem. – Read More – NCSC Feed
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles. – Read More – NCSC Feed
Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes. – Read More – NCSC Feed
This guidance is aimed at service owners and security specialists involved in the provision of online services. – Read More – NCSC Feed
There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each. – Read More – NCSC Feed
Guidance for organisations wishing to deploy products that use IPsec. – Read More – NCSC Feed
How to reduce the likelihood of unauthorised content appearing within your organisation’s social media channels. – Read More – NCSC Feed
Questions to ask your suppliers that will help you gain confidence in their cyber security. – Read More – NCSC Feed
Protecting your organisation’s telephony systems from cyber attacks and telecoms fraud. – Read More – NCSC Feed
Advice on the selection and deployment of Protective Domain Name Systems (DNS). – Read More – NCSC Feed
Making sense of cyber security in OT environments – Read More – NCSC Feed
An architecture pattern for safely importing data into a system from an external source. – Read More – NCSC Feed
How to defend your organisation from email phishing attacks. – Read More – NCSC Feed
Guidance for preventing lateral movement in enterprise networks. – Read More – NCSC Feed
Laying the groundwork for incident readiness. – Read More – NCSC Feed
Why macros are a threat, and the approaches you can take to protect your systems. – Read More – NCSC Feed
Following attacks on political party websites, this guidance provides a summary of 5 practical steps that your organisation can take to help it prepare to respond in the event of a Denial of Service (DoS) attack. – Read More – NCSC Feed
Advice for organisations experiencing a ransomware attack and the partner organisations supporting them. – Read More – NCSC Feed
How to make sure your organisation is prepared for home working. – Read More – NCSC Feed
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Mozilla Thunderbird ESR is a version of...
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete...
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to...
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Acrobat and Reader is used to view, create, print, and manage PDF files on desktop and mobile. Substance 3D Sampler is a 3D scanning software that uses AI to create 3D models and materials from real-world images. Adobe Illustrator is a...
Multiple vulnerabilities have been discovered Fortinet Products, the most severe of which could allow for remote code execution. FortiManager is a network and security management tool that provides centralized management of Fortinet devices from a single console. FortiManager Cloud is a cloud-based service for centralized management, monitoring, and automation of Fortinet devices across multiple sites FortiOS is the Fortinet’s proprietary...
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete...
CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24983 Microsoft Windows Win32k Use-After-Free Vulnerability CVE-2025-24984 Microsoft Windows NTFS Information Disclosure Vulnerability CVE-2025-24985 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability CVE-2025-24991 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability CVE-2025-26633 Microsoft Windows Management...
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Optigo Networks Equipment: Visual BACnet Capture Tool, Optigo Visual Networks Capture Tool Vulnerabilities: Use of Hard-coded, Security-relevant Constants, Authentication Bypass Using an Alternate Path or Channel 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication, gain control over the products,...
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.8 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: Uni-Telway Driver Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform a denial of service. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports the following products are affected: Schneider Electric Uni-Telway Driver: All versions...
CISA released two Industrial Control Systems (ICS) advisories on March 11, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-070-01 Schneider Electric Uni-Telway Driver ICSA-25-070-02 Optigo Networks Visual BACnet Capture Tool/Optigo Visual Networks Capture Tool CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations. – Read...
The new algorithm will serve as a backup for the general encryption needed to protect data from quantum computers developed in the future. – Read More – News and Events Feed by Topic
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-25181 Advantive VeraCore SQL Injection Vulnerability CVE-2024-57968 Advantive VeraCore Unrestricted File Upload Vulnerability CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability These types of vulnerabilities are frequent...
The Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3) has released an alert warning of a scam involving criminal actors masquerading as the “BianLian Group.” The cyber criminals target corporate executives by sending extortion letters threatening to release victims’ sensitive information unless payment is received. CISA encourages organizations to review the following FBI Public Service Announcement for more information: Mail...
Using differential privacy can help organizations glean useful insights from databases while protecting individuals’ data. – Read More – News and Events Feed by Topic
Using differential privacy can help organizations glean useful insights from databases while protecting individuals’ data. – Read More – News and Events Feed by Topic
Post Content – Read More – IC3.gov News
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: PCU400, PCULogger Vulnerabilities: Access of Resource Using Incompatible Type (‘Type Confusion’), NULL Pointer Dereference, Use After Free, Double Free, Observable Discrepancy, Out-of-bounds Read 2. RISK EVALUATION Exploitation of these vulnerabilities could allow an attacker to access or decrypt sensitive data, crash the device...