
Student discovers security flaw in Virgin Media recruitment system
A student has discovered a security vulnerability in the software which Virgin Media uses for recruitment and job applications.
Source: SC Magazine Student discovers security flaw in Virgin Media recruitment system

Phishing emails promising invites to cybersecurity conference actually dispersing malware
Threat actors have been discovered trying to infect security-minded individuals with a trojan downloader by sending spear phishing emails that offer free invitations to Palo Alto Networks' Cyber Security Summit in Jakarta, Indonesia.
Source:…

Shadow Brokers claim to leak NSA cyberespionage targets
The Shadow Brokers hacking group has leaked another batch of NSA-linked data containing a list of servers linked to cyberespionage hacking programs.
Source: SC Magazine Shadow Brokers claim to leak NSA cyberespionage targets

EU privacy regulators query Yahoo CEO on breach
Yahoo CEO Marissa Mayer was sent a letter from a watchdog group overseeing privacy regulators in the European Union seeking answers on the affect of a massive breach the company experienced.
Source: SC Magazine EU privacy regulators query Yahoo…

Protecting your organisation from ransomware
Ransomware is a growing global cyber security threat, and one which could affect any organisation...

Macro Security for Microsoft Office
This guidance describes how administrators can help protect their systems from malicious Microsoft...

What can the NCSC do for you?
If you’re browsing this website, you might be wondering how the new National...

Digital service security
We use digital services to manage just about every aspect of our lives....

Whaling: how it works, and what your organisation can do about it
Whaling is a highly targeted phishing attack - aimed at senior executives - masquerading as...



Threat intelligence: executive summary & infographic
A one page introduction to the importance of threat intelligence, and an infographic...

PIANOS: Protecting Information About Networks, the Organisation and its Systems
Electronic material, common to all IT infrastructures, is used by intruders to understand...
















