
A day in the life of an NCSC vulnerability researcher
Have you ever wondered what it's like to work in the NCSC Vulnerability Research...

Oracle Issues Emergency Patches for ‘JoltandBleed’ Vulnerabilities
Oracle pushed out an emergency update for vulnerabilities dubbed 'JoltandBleed' affecting five of...

White House Releases VEP Disclosure Rules
The White House released a charter document on Wednesday outlining how the U.S....

Cisco Warns of Critical Flaw in Voice OS-based Products
Cisco Systems issued patch that fixes a critical vulnerability impacting 12 products running...

Microsoft Patches 20 Critical Vulnerabilities
This month, Microsoft's Patch Tuesday updates tackle fixes for 53 security bugs in...

Wholesome guidance from the Sociotechnical Security Group
In my last blog I talked a little bit about sociotechnical systems, and the fact...

Phishing Biggest Threat to Google Account Security
Phishing remains the biggest account takeover threat to Google users, surpassing keyloggers and...

AutoIt Scripting Used By Overlay Malware to Bypass AV Detection
IBM’s X-Force Research team reports hackers attacking Brazilian banks are using the Windows...

EUD Security Guidance: iOS 11
This guidance was developed following testing performed on an iPhone SE and an...

Microsoft Provides Guidance on Mitigating DDE Attacks
Microsoft published guidance for Windows admins on how to safely disable Dynamic Data...

Hundreds of Millions in Digital Currency Remains Frozen
Between $150 million and $300 million in digital currency called ether remains inaccessible...

Cisco Patches DoS Flaw in BGP over Ethernet VPN Implementation
Cisco has updated its IOS XE software to address a denial of service...

1M Downloads Later, Google Pulls Phony WhatsApp From Google Play
An adware-laden phony WhatsApp download has been removed from Google Play and the...

Data Pours from Cloud—And ‘The Enemy is Us’
Enterprises are grappling with widespread incidents of misconfigured servers leaking sensitive data to...

Poisoned Search Results Deliver Banking Malware
Zeus Panda, a banking Trojan designed to steal credentials, is being distributed via...

Taking HTTPS Denial to an Absurd Level
Researcher Troy Hunt discovers as far as the internet has come in adopting...

Apple Patches KRACK Vulnerability in iOS 11.1
Apple has patched the KRACK vulnerability in iOS and elsewhere in its product...

Emergency Oracle Patch Closes Bug Rated 10 in Severity
Oracle released an emergency patch for a remote code execution vulnerability in Oracle...

Flaw in Google Bug Tracker Exposed Reports About Unpatched Vulnerabilities
Google’s Issue Tracker contained until recently a vulnerability that would allow an external...

Google to Ditch Public Key Pinning in Chrome
Google says upcoming version of Chrome will deprecate the browser's support for HTTP...

Malicious Chrome Extension Steals Data Posted to Any Website
A malicious Google Chrome extension being spread in phishing emails steals any data...

The serious side of pranking
I was recently targeted for a prank and have taken the unorthodox step...

Coming soon: *new* guidance on Risk Management for Cyber Security
We mentioned in a previous blog that the NCSC is working on producing some guidance...

'Krack' Wi-Fi guidance
The NCSC is currently investigating the impact of the vulnerability in WPA2 Wi-Fi networks known...

Slack Plugs ‘Severe’ SAML User Authentication Hole
Cloud-based communications platform Slack finished patching a severe security hole Thursday affecting portions...

New edition of cyber security guidance helps small businesses to tackle common cyber attacks
If you’re a small or medium-sized enterprise (SME) then there’s around a 1 in 2...

Two Critical Vulnerabilities Found In Inmarsat’s SATCOM Systems
Global satellite telecommunications company Inmarsat is warning customers of two critical vulnerabilities that...

Malvertising Campaign Redirects Browsers To Terror Exploit Kit
Hackers behind the Terror exploit kit ramp up distribution via a two-month long...

Updating our Windows 10 guidance
If you're involved in the enterprise management of IT systems, you'll probably know...

EUD Security Guidance: Windows 10 – 1703
About this guidance This guidance has been updated to cover the 1703 “Creators...