Retaining defensive advantage in the age of frontier AI cyber capabilities
As AI accelerates vulnerability discovery, organisations must raise their security baselines to safeguard their cyber security.
This includes feeds from blog-post
As AI accelerates vulnerability discovery, organisations must raise their security baselines to safeguard their cyber security.
New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.
Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and authentication tokens.
The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.
The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager.
Understanding the threats and staying ahead of the adversary
UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway.
Dr Richard Horne delivered a keynote about cyber risks and opportunities at the RSAC Conference in San Francisco
If ‘vibe coding’ disrupts the software market like SaaS did 20 years ago, what does this mean for cyber security?
CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity: Resilience, Technology, Threat, and Ecosystem.
In response to the evolving events in the Middle East, the NCSC is advising that UK organisations review their cyber security posture.
Agencies strongly encourage immediate investigation of potential compromise of Cisco Catalyst SD-WAN.
Organisations with experience in external attack surface management can help us shape future ACD 2.0 services.
How to ensure the ‘organisational memory’ of past vulnerabilities is not lost.
CSPM tools are big business. Could they be the answer to your cloud configuration problems?
CRTFs are helping organisations to make informed, risk-based decisions on the adoption of technology products.
Russian‑aligned hacktivist groups continue to target UK organisations with disruptive cyber attacks
The NCSC encourages local government and critical infrastructure operators to harden their ‘denial of service’ (DoS) defences
New principles help organisations to design, review, and secure connectivity to (and within) OT systems.
With GCAP, the UK government is taking decisive steps towards a safer, more resilient future.