The second report examining how the NCSC’s ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem. Source link lol
Read MoreTechnical report on best practice use of this fundamental data routing protocol. Source link lol
Read MoreMay 09, 2024NewsroomMobile Security / Cyber Attack Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. “The campaign sent emails with content intended to arouse the recipient’s interest and persuade him to click on the link,” the computer emergency response team, CERT Polska,…
Read MoreThe year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe. Source link lol
Read MoreThe FBI has issued a warning to US retailers about a financially-motivated malicious hacking ring that has been targeting employees with phishing attacks in an attempt to create fraudulent gift cards. Staff at the corporate offices of US retail companies have been the target of highly-sophisticated email phishing and SMS phishing (“smishing”) attacks. These attacks…
Read MoreDell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers. The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached. “We are currently investigating an incident involving a Dell portal, which…
Read MoreCISA released four Industrial Control Systems (ICS) advisories on May 09, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations. Source link lol
Read MoreThe year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme. Source link lol
Read MoreAssessing the security of network equipment. Source link lol
Read MoreA technical analysis of a new variant of the SparrowDoor malware. Source link lol
Read More