
Windows application developer guidance
This guidance contains recommendations for the secure development, procurement and deployment of Windows applications. Please familiarise yourself with the generic application...

The NCSC’s guide to developing, procuring and deploying applications
We've just updated our Application development guidance. In addition to the existing Android and...

“Equi-Facts”: Equifax Clarifies the Numbers for Its Massive Breach
As companies continue to install the vulnerable version of Apache Struts behind the...

FBI: Cyber-Fraud Losses Rise to Reach $1.4B
Tech-support scams took off during the year, while whaling/business email compromise was the...

Lenovo Patches Arbitrary Code Execution Flaw
Lenovo warns of a high-severity bug impacting its System x line of servers,...

EUD Security Guidance: macOS 10.13 High Sierra
This guidance was developed following testing performed on MacBook Pro and MacBook Air...

Report: Intel Facing New Spectre-Like Security Flaws
Intel may be facing as many as eight new Spectre-level vulnerabilities in its...

CyberFirst Girls’ talent showcased as the 2018 competition comes to a close
One of the best things about working on the CyberFirst Girls Competition is seeing the...

Twitter Urges Users to Change Passwords Due to Glitch
A glitch caused Twitter passwords to be stored in plain text on an...

Critical Cisco WebEx Bug Allows Remote Code Execution
Attackers can leverage the flaw by convincing users to open a file purported...

Free Speech Advocates Blast Amazon Over Threats Against Signal
Secure-messaging firm Signal was told by Amazon not to use its AWS servers...

Facebook Introduces ‘Clear History’ Option Amid Data Scandal
Facebook hopes to improve data privacy with a new feature letting users flush...

Millions of Home Fiber Routers Vulnerable to Complete Takeover
Exploitation can result in hackers gaining access to full browsing histories and all...

Volkswagen Cars Open To Remote Hacking, Researchers Warn
Vulnerable in-vehicle infotainment systems have left some Volkswagen cars open to remote hacking,...

Tens of Thousands of Malicious Apps Using Facebook APIs
The apps are deemed malicious by doing things such as capturing pictures and...

USB Sticks Can Trigger BSOD – Even on a Locked Device
Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the...

Twitter Sold Data To Cambridge Analytica-Linked Company
Twitter is the latest company to face backlash for how it handles data...

NIS Directive – Cyber Assessment Framework
The implementation of the EU Security of Networks and Information Systems (NIS) Directive...

CAF – Objective D
D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber...

CAF – Objective C
C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect...

CAF – Objective A
A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and...

CAF – Objective B
B1 Service Protection Policies and Processes Proportionate security measures in place to protect...


B6. Staff awareness and training
Principle Staff have appropriate awareness, knowledge and skills to carry out their organisational...

Introduction to the Cyber Assessment Framework
One of the key objectives of the NIS Directive is to ensure that...

SamSam Ransomware Evolves Tactics: Targeting Whole Companies
The gang behind the Atlanta city shutdown and other attacks is selecting victims...

Behaviour and conduct at CYBERUK 2018: how did we do?
I still can’t believe CYBERUK 2018 is over – after so much hard...

Rubella Crimeware Kit: Cheap, Easy and Gaining Traction
Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial...

Improving authentication across the UK
At the NCSC we hear about huge numbers of new technologies that are...

Europol Smacks Down World’s Largest DDoS-for-Hire Market
Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks...