
Produce clean & maintainable code
If your code lacks consistency, is poorly laid out and undocumented, you're adding...

Keep your security knowledge sharp
Creating code that is capable of withstanding attack requires an understanding of attack...

Secure development is everyone's concern
Genuine security benefits can only be realised when delivery teams weave security into...

Plan for security flaws
All but the very simplest software is likely to contain bugs, some of...

Secure the build and deployment pipeline
Continuous integration, delivery and deployment are modern approaches to the building, testing and...

Apple Fixes Flaw Impacting HomeKit Devices
Apple said it has fixed an undisclosed vulnerability in its HomeKit framework that...

Banking Apps Found Vulnerable to MITM Attacks
Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile...

Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones
As part of its December Android and Pixel/Nexus security updates, Google has issued...

TeamViewer Rushes Fix for Permissions Bug
TeamViewer says it has issued a hotfix to address a bug that allows...

Developers Targeted in ‘ParseDroid’ PoC Attack
A proof of concept attack developed by researchers target users of the development...

Ursnif Trojan Adopts New Code Injection Technique
Researchers have found a variant of Ursnif Trojan they said is a “v3...

Managing supply chain risk in cloud-enabled products
There’s been a lot of speculation about foreign involvement in the UK supply...

CyBOK – the scope
If you missed the earlier blogs and don't know what CyBOK is -...

Managing the risk of cloud-enabled products
Organisations are increasingly deploying software to both servers and end user devices that...

Small Business Guide: Video Collection
The videos below introduce the five quick and easy steps outlined in the NCSC's...

Cisco Patches Critical Playback Bugs in WebEx Players
A Cisco Systems security advisory is urges users of its WebEx platform to...

RAT Distributed Via Google Drive Targets East Asia
Researchers say a new remote access Trojan dubbed UBoatRAT is targeting individuals or...

Critical Apple Login Bug Puts macOS High Sierra Systems at Risk
A major bug in Apple’s macOS High Sierra gives anyone with physical access...

Leaky AWS Storage Bucket Spills Military Secrets, Again
For the second time in ten days, researchers at UpGuard released sensitive data...

Imgur Confirms 2014 Breach of 1.7 Million User Accounts
Researcher Troy Hunt is credited for tipping image sharing site Imgur off to...

Newly Published Exploit Code Used to Spread Marai Variant
Qihoo 360 Netlab researchers reported on Friday that they are tracking an uptick...

NCSC advice for Uber customers and drivers
Who is this guidance for? This guidance is aimed at all UK Uber...

SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’
A proof-of-concept attack demonstrates how adversaries can abuse Microsoft’s Active Directory Federation Services...

Reflecting on your development processes: fast-track your learning
The way your product development process is set up has a big, but sometimes poorly visible,...

Firmware bugs are like buses
It seems that firmware vulnerabilities are just like buses, you wait for one...

Uber Reveals 2016 Breach of 57 Million User Accounts
Uber CEO said a 2016 data breach that exposed 57 million Uber user...

Intel Patches CPU Bugs Impacting Millions of PCs, Servers
Intel released eight patches for vulnerabilities in remote management software and firmware that...

US-CERT Warns of ASLR Implementation Flaw In Windows
US-CERT is warning of a vulnerability in Microsoft’s implementation of Address Space Layout...

This Black Friday, we’re giving away… advice!
It's the Black Friday sales soon, and many of you will be thinking...

Amazon Promises Fix to Stop Key Service Hack
Amazon said it will offer a fix for its Amazon Key delivery service...