Why vulnerabilities are like buses
Why vulnerabilities are like buses There's an old saying that you wait ages for a bus, and then several come...
Why vulnerabilities are like buses There's an old saying that you wait ages for a bus, and then several come...
Using secure messaging, voice and collaboration apps With 'hybrid working' (a combination of working from home and the office) now...
Log4j vulnerability: what should boards be asking? The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern...
Cyber Security in the Built Environment - considering security throughout a buildings lifecycle A building being designed today is, as...
The Technology Assurance principles In this blog post I want to introduce a new family of principles, the Technology Assurance...
'Transaction monitoring' & 'Building and operating a secure online service' guidance published If you're responsible for the designing and running...
Zero Trust migration: where do I start? Following our ‘Zero Trust: is it right for me?' blog, this second installment...
The Cyber Assessment Framework 3.1 This latest version of the Cyber Assessment Framework (CAF), 3.1, supports the CAF's core users -...
New SOC guidance 101 Security operations centres (or SOCs) are notoriously difficult to design, build and operate. But they're also...
Relaunching the NCSC's Cloud security guidance collection This week we have launched the updated NCSC’s cloud security guidance. It’s more...
Avoiding crisis mismanagement Every day, an eclectic range of cyber attacks take place across the UK. No two attacks are...
Mythbusting cloud key management services The NCSC’s recently-updated cloud security guidance includes a new section on how to configure and...
ACD the 5th Year: report now available to download The aim of the NCSC's Active Cyber Defence (ACD) programme is...
Introducing our new machine learning security principles Artificial intelligence (AI) and machine learning (ML) systems are increasingly used in every...
Securing the cloud (by design *and* by default) In any conversation about cloud security, it won’t take long before someone...
Supply chain cyber security: new guidance from the NCSC Many of us rely on suppliers to deliver products, systems, and...
Protect your customers to protect your brand We're pleased to publish a brace of documents that will help organisations to...
The security benefits of modern collaboration in the cloud When using cloud services, it is important to balance the need...
A popular British hacker was charged by the U.S. authorities for allegedly running the ‘The Real Deal’ dark web marketplace....
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: f52a0fd36a878077caa1859e9806d4ecSHA1: 3e6ea7b92af7d1b14731ff301d9222c90f4db5d0ANALYSIS DATE: 2022-10-27T03:00:19ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...
Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: e5253585af59f9701f1a788ae87b9e73SHA1: e1b192fbbde83210802b354dcef2c37aaa180ee2ANALYSIS DATE: 2022-10-27T02:40:21ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 761a9e0e651fafb4d84bc498d2dd0592SHA1: 608d3ee4077187f393187df136621cfc759e0ebdANALYSIS DATE: 2022-10-27T03:00:54ZTTPS: T1107, T1490, T1091, T1005, T1081, T1082 ScoreMeaningExample10Known badA malware...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 1c77d77cf6315ad1950a40ea458877a0SHA1: 483919c804bfda0e81cbae8f8dc13e4f3939f4ddANALYSIS DATE: 2022-10-27T03:00:40ZTTPS: T1091, T1005, T1081, T1082, T1107, T1490 ScoreMeaningExample10Known badA malware...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: e77ea49d5fbad2932349f52935769e49SHA1: af147f64e589ddc73f470caad6806618a0c34902ANALYSIS DATE: 2022-10-27T03:00:47ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...