Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap. – Read More – NCSC Feed
Category: Gov/ISAC Feeds
We caught up with George Brown, founder of PORGiESOFT, about his first few weeks in NCSC For Startups… – Read More – NCSC Feed
Saj Huq of Plexal explains why collaboration with the NCSC brings opportunities to the cyber security sector. – Read More – NCSC Feed
How startups can make the most of their time when pitching to cyber security experts. – Read More – NCSC Feed
New guidance from the NCSC helps system and risk owners plan their migration to post-quantum cryptography (PQC). – Read More – NCSC Feed
The ‘Motivating Jenny’ project is helping to change the conversation about security in software development. – Read More – NCSC Feed
Avoiding common problems when moving to the cloud. – Read More – NCSC Feed
Why trying to avoid trusting the KMS doesn’t make sense (and other common misconceptions). – Read More – NCSC Feed
Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability. – Read More – NCSC Feed
NCSC CEO Felicity Oswald shares reflections on keeping the 2024 General Election safe. – Read More – NCSC Feed
What you need to know before buying artificially intelligent security products – Read More – NCSC Feed
Launching a new Industry Assurance scheme aimed at helping the UK’s small organisations. – Read More – NCSC Feed
The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it. – Read More – NCSC Feed
Large Language Models are an exciting technology, but our understanding of them is still ‘in beta’. – Read More – NCSC Feed
How ‘small but actionable’ insights can improve behaviours and decision making. – Read More – NCSC Feed
SMS and telephone guidance updated to address the rise in Artificial Inflation of Traffic (AIT). – Read More – NCSC Feed
New ACD services developed to help protect SMEs from the harms caused by cyber attacks. – Read More – NCSC Feed
This report outlines the risks associated with the use of official and third party app stores. – Read More – NCSC Feed
Assessing the security of network equipment. – Read More – NCSC Feed
The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made. – Read More – NCSC Feed
Cyber incident trends in the UK with guidance on how to defend against, and recover from them. – Read More – NCSC Feed
How to limit the effectiveness of tools commonly used by malicious actors. – Read More – NCSC Feed
Key findings from the 5th year of the Active Cyber Defence (ACD) programme. – Read More – NCSC Feed
The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme. – Read More – NCSC Feed
Key findings and full report from the 6th year of the Active Cyber Defence (ACD) programme. – Read More – NCSC Feed
The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe. – Read More – NCSC Feed
The second report examining how the NCSC’s ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem. – Read More – NCSC Feed
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles. – Read More – NCSC Feed
Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes. – Read More – NCSC Feed
This guidance is aimed at service owners and security specialists involved in the provision of online services. – Read More – NCSC Feed
There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each. – Read More – NCSC Feed
Guidance for organisations wishing to deploy products that use IPsec. – Read More – NCSC Feed
How to reduce the likelihood of unauthorised content appearing within your organisation’s social media channels. – Read More – NCSC Feed
Questions to ask your suppliers that will help you gain confidence in their cyber security. – Read More – NCSC Feed
Protecting your organisation’s telephony systems from cyber attacks and telecoms fraud. – Read More – NCSC Feed
Advice on the selection and deployment of Protective Domain Name Systems (DNS). – Read More – NCSC Feed
Making sense of cyber security in OT environments – Read More – NCSC Feed
An architecture pattern for safely importing data into a system from an external source. – Read More – NCSC Feed
How to defend your organisation from email phishing attacks. – Read More – NCSC Feed
Guidance for preventing lateral movement in enterprise networks. – Read More – NCSC Feed
Laying the groundwork for incident readiness. – Read More – NCSC Feed
Why macros are a threat, and the approaches you can take to protect your systems. – Read More – NCSC Feed
Following attacks on political party websites, this guidance provides a summary of 5 practical steps that your organisation can take to help it prepare to respond in the event of a Denial of Service (DoS) attack. – Read More – NCSC Feed
Advice for organisations experiencing a ransomware attack and the partner organisations supporting them. – Read More – NCSC Feed
How to make sure your organisation is prepared for home working. – Read More – NCSC Feed
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Mozilla Thunderbird … Read More “Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Critical Patches Issued for Microsoft Products, March 11, 2025 – Cyber Security Advisories – MS-ISAC
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users … Read More “Critical Patches Issued for Microsoft Products, March 11, 2025 – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Acrobat and Reader is used to view, create, print, and manage PDF files on desktop and mobile. Substance 3D Sampler is a 3D scanning software that uses AI to create 3D models and materials from real-world … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered Fortinet Products, the most severe of which could allow for remote code execution. FortiManager is a network and security management tool that provides centralized management of Fortinet devices from a single console. FortiManager Cloud is a cloud-based service for centralized management, monitoring, and automation of Fortinet devices across multiple sites … Read More “Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »