Cyber threats

Current and common threats and vulnerabilities.
Showing 1 - 25 of 110 results
Sort by: A-Z|Date
  • Weekly Threat Report 16th February 2018

    Report16 Feb 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • NCSC building with logo

    Russian military ‘almost certainly’ responsible for destructive 2017 cyber attack

    News15 Feb 2018TopicsCyber threats, Cyber attacks, The NCSC
  • NCSC building with logo

    NCSC statement: Malware being used to illegally mine cryptocurrency

    News12 Feb 2018TopicsCyber threats, The NCSC

    Incidents of malware being used to illegally mine cryptocurrency are being investigated by technical experts at the NCSC.

  • NCSC advice: Malicious software used to illegally mine cryptocurrency

    Guidance12 Feb 2018TopicsCyber threats, Cyber attacks

    This guidance will be updated as and when new information is available.

    Guidance for members of the public, website administrators and JavaScript developers in relation to the recently publicised cryptocurrency mining compromises of several websites

  • Weekly Threat Report 9th February 2018

    Report09 Feb 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 2nd February 2018

    Report02 Feb 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • I. Understand the risks

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    The first three principles deal with the information gathering stage.

  • III. Check your arrangements

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    Businesses will need to gain confidence in their approach to establishing control over their supply chain.

  • IV. Continuous improvement

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    As your supply chain evolves, you'll need to continue improving and maintaining security.

  • Assessing supply chain security

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats

    The table below gives you a series of scenarios against which to measure the security of your supply chain.

  • Supply chain security collection

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive
  • Assessing supply chain management practice

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    It is expected that your will already be following good procurement and contracting practice. This guidance offers additional factors that you may consider.

  • Supply chain security: 12 Principles infographic

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    The twelve principles in an abbreviated, easy to digest, printable format

  • The principles of supply chain security

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    This guidance proposes a series of 12 principles, designed to help you establish effective control and oversight of your supply chain.

  • II. Establish control

    Guidance28 Jan 2018TopicsPhysical security, Personnel security, Cyber threats, NIS Directive

    This section's principles will help you gain and maintain control of your supply chain.

  • Weekly Threat Report 26th January 2018

    Report26 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 19th January 2018

    Report19 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 12th January 2018

    Report12 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 5th January 2018

    Report05 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 22nd December 2017

    Report22 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 15th December 2017

    Report15 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 8th December 2017

    Report08 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 1st December 2017

    Report01 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 24th November 2017

    Report24 Nov 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 17th November 2017

    Report17 Nov 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.

    This report is drawn from recent open source reporting.