
CopyCat Malware Infected 14M Android Devices, Rooted 8M, in 2016
Over the course of two months last year the Copycat malware infected 14 million Android devices and rooted more than half of them, roughly eight million devices.

Microsoft Issues ‘Important’ Security Fix for Azure AD Connect
Microsoft is warning customers of an “important” update to its Azure AD Connect service that could allow for an elevation of privilege attack against affected systems.

Securing Agile Delivery: Collaboration is Crucial
CyberUK may seem like ancient history now but I hope we gave you lots...

LinkedIn 2012 hack: what you need to know
On Friday the NCSC published a summary of guidance for people concerned about the 2012...

Password guidance summary: how to protect against password-guessing attacks
Recently, the NCSC have seen an increase in a number of incidents, and also...

Microsoft Says Fireball Threat ‘Overblown’
Check Point has toned down its initial estimates on the number of Fireball malware infections from 250 million machines and 20 percent of corporate networks to 40 million computers.
Source: Malware Microsoft Says Fireball Threat ‘Overblo…

Breach at UK.gov’s Cyber Essentials scheme exposes users to phishing attacks
The operation behind the UK government's Cyber Essentials scheme has suffered a breach exposing the email addresses of registered consultancies, it told them today.

Who are the cyberists?
You’ll have noticed that as part of the CyberFirst initiative we’ve been using the term...

IoT Malware Activity Already More Than Doubled 2016 Numbers
The number of new malware samples in the wild this year targeting connected internet-of-things (IoT) devices has already more than doubled last year’s total.
Source: Malware IoT Malware Activity Already More Than Doubled 2016 Numbers

Someone Failed to Contain WannaCry
As reports of the NSA officially connecting WannaCry to North Korea surface, experts are saying developers failed to contain the ransomware before it was ready for deployment.
Source: Malware Someone Failed to Contain WannaCry

Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’ Program
The latest dump from Wikileaks alleges the CIA installed custom router firmware on unsuspecting targets in order to spy on internet activity.
Source: Malware Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’…

Microsoft Patches Two Critical Vulnerabilities Under Attack
Microsoft patched 95 vulnerabilities today, including two under attack.
Source: Malware Microsoft Patches Two Critical Vulnerabilities Under Attack

Zusy Malware Installs Via Mouseover – No Clicking Required
Zusy malware installs when victims hover over an opened PowerPoint file – no clicking needed.
Source: Malware Zusy Malware Installs Via Mouseover – No Clicking Required

QakBot Returns, Locking Out Active Directory Accounts
QakBot, a worm-like, information-stealing strain of malware is back and locking users out of their Active Directory accounts.
Source: Malware QakBot Returns, Locking Out Active Directory Accounts

Certifying the professionals
We had a number of great questions during CyberUK2017, and some of those...

Password Breaches Fueling Booming Credential Stuffing Business
The market for automated credential stuffing tools is growing fast, because of a record number of breaches.
Source: Malware Password Breaches Fueling Booming Credential Stuffing Business

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution
Attackers can remotely execute code on targeted systems via specially crafted subtitle files for videos.
Source: Malware Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution

EternalRocks Worm Spreads Seven NSA SMB Exploits
A worm called EternalRocks has been spreading seven Windows SMB exploits leaked by the ShadowBrokers, including EternalBlue, which was used to spread WannaCry.
Source: Malware EternalRocks Worm Spreads Seven NSA SMB Exploits

Putting the NCSC's badge on it…
We're often asked questions that sound something like "can you recommend <a thing>...

NCSC IT: The architecture behind NCSC's IT system
In the second blog about the NCSC's IT system we focus on our...

NCSC IT: MDM products – which one is best?
We often talk with people who are building IT for the public sector,...

Available Tools Making Dent in WannaCry Encryption
Remove specific prevalent malware with Windows Malicious Software Removal Tool.

'WannaCry' ransomware: guidance updates
Over the weekend, as we learnt more about the WannaCry ransomware, we published...

Ransomware: 'WannaCry' guidance for enterprise administrators
The NCSC is currently working with organisations and partners in the UK affected...

Ransomware: 'WannaCry' guidance for home users and small businesses
The NCSC is currently working with organisations and partners in the UK affected...

Ransomware: Latest NCSC Guidance
The NCSC are aware of a ransomware campaign relating to version 2 of...

Phishing: guidance for political parties and their staff
This guidance has been produced for individuals and IT departments within political parties...

Finding the kill switch to stop the spread of ransomware
Media reports today have rightly praised the efforts of MalwareTech to tackle the...

Leaked NSA Exploit Spreading Ransomware Worldwide
Attackers behind today’s WannaCry ransomware outbreak in Europe are spreading the malware using the EternalBlue exploit leaked by the ShadowBrokers.
Source: Malware Leaked NSA Exploit Spreading Ransomware Worldwide

NHS across England hit by large-scale cyber-attack
A number of hospitals have been hit by a large scale cyber attack, NHS England has confirmed. We're aware of at least eleven Trusts that have been affected.