UK looks at tougher consumer protections against malicious apps

Proposals include a world-first code of practice to set minimum security and privacy requirements for app store operators and developers

Read more

UK and US exposes Russian spy agency behind cyber incidents

The UK, together with the US and other allies, has exposed historic malign cyber activity of Russia’s Federal Security Service

Read more

New Scanning Made Easy trial service from the NCSC and i100

he NCSC has introduced a new trial service that will release vulnerability scanning scripts to help organisations identify vulnerabilities on

Read more

Report reveals the state of cyber security in the UK charity sector

A report has revealed that more than half of UK charities believe that they are likely to suffer a cyber

Read more

New plans to boost cyber security of UK’s digital supply chains

IT service providers could be required to follow new cyber security rules such as the National Cyber Security Centre’s Cyber Assessment

Read more

Ransomware Task Force (RTF) announce framework to combat ransomware

The Ransomware Task Force (RTF), a US-led team convened in early 2021 with participants from governments, software firms, cyber security vendors, non-profit

Read more

UK Education continues to face ransomware threat

The UK education sector continues to face an increased threat from ransomware attacks with a notable rise since students returned

Read more

The NCSC and Microsoft are looking for cybersecurity companies to help protect the UK

Microsoft is partnering with the Government’s National Cyber Security Centre’s Cyber Accelerator programme, to find and develop start-ups that can make

Read more

UK exposes series of Russian cyber attacks against Olympic and Paralympic Games

Russia’s military intelligence service, the GRU, conducted cyber reconnaissance against officials and organisations at the 2020 Olympic and Paralympic Games

Read more

SoreFang Malware

Malware, dubbed ‘SoreFang’ by the NCSC, is a first stage downloader that uses HTTP to exfiltrate victim information and download

Read more
%d bloggers like this: