Vulnerabilities

Weaknesses in an IT system which could be exploited to deliver a successful attack
Showing 1 - 25 of 91 results
Sort by: A-Z|Date
  • Weekly Threat Report 16th February 2018

    Report16 Feb 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Home user guidance to manage processor vulnerabilities ‘Meltdown’ and ‘Spectre’

    Guidance14 Feb 2018TopicsVulnerabilities

    This page will be updated as more information becomes available.   Guidance for enterprise administrators can be located here.

    Guidance for home users in relation to the recently published processor vulnerabilities ‘Meltdown’ and ‘Spectre’

  • 'Meltdown' and 'Spectre' guidance

    Guidance14 Feb 2018TopicsVulnerabilities

    This page will be updated as more information becomes available. Guidance for home users can be located here.

    Guidance for enterprise administrators in relation to the recently published processor vulnerabilities ‘Meltdown’ and ‘Spectre’

  • Weekly Threat Report 9th February 2018

    Report09 Feb 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 2nd February 2018

    Report02 Feb 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 26th January 2018

    Report26 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 19th January 2018

    Report19 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • NCSC building with logo

    NCSC statement: Apple vulnerability

    News18 Jan 2018TopicsVulnerabilities, The NCSC

    An NCSC statement on the reported Apple vulnerability

  • Weekly Threat Report 12th January 2018

    Report12 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 5th January 2018

    Report05 Jan 2018TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • NCSC building with logo

    NCSC response to reports about flaws in processors

    News04 Jan 2018TopicsVulnerabilities, The NCSC

    An NCSC statement regarding reports of potential flaws affecting computer processors.

  • TRITON Malware Targeting Safety Controllers

    Information22 Dec 2017TopicsVulnerabilities

    The NCSC is aware of reporting relating to malware dubbed 'TRITON', discovered to be targeting Triconex safety controllers.

  • Weekly Threat Report 22nd December 2017

    Report22 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 15th December 2017

    Report15 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 8th December 2017

    Report08 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 1st December 2017

    Report01 Dec 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.

    This report is drawn from recent open source reporting.

  • NCSC advice for Uber customers and drivers

    Guidance27 Nov 2017TopicsCyber attacks, Vulnerabilities

    This page will be updated with advice for customers and drivers as more information comes to light about the Uber data breach.

  • Weekly Threat Report 24th November 2017

    Report24 Nov 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    This report is drawn from recent open source reporting.

  • Work with the NCSC

    A day in the life of an NCSC vulnerability researcher

    Blog post17 Nov 2017AuthorJon BTopicsSkills and training, Vulnerabilities, The NCSC

    Have you ever wondered what it's like to work in the NCSC Vulnerability Research team, and how it compares to working in industry?

  • Weekly Threat Report 17th November 2017

    Report17 Nov 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.

    This report is drawn from recent open source reporting.

  • NCSC building with logo

    NCSC welcomes report into security of connected toys

    News14 Nov 2017TopicsVulnerabilities, The NCSC

    Vulnerabilities in connected toys could potentially enable a stranger to talk to a child.

  • Weekly Threat Report 10th November 2017

    Report10 Nov 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.

    This report is drawn from recent open source reporting.

  • Weekly Threat Report 3rd November 2017

    Report03 Nov 2017TopicsCyber threats, Cyber attacks, Vulnerabilities

    We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.

    This report is drawn from recent open source reporting.

  • 'Krack' Wi-Fi guidance

    Guidance30 Oct 2017TopicsNetwork security, Vulnerabilities

    Updated at 08:30, 30 October. 

    Guidance for enterprise administrators, small businesses and home users in relation to the recently published 'Krack' vulnerability in Wi-Fi networks protected by WPA2.

  • Fishing

    The serious side of pranking

    Blog post30 Oct 2017AuthorIan LevyTopicsCyber threats, Vulnerabilities

    The National Cyber Security Centre's Technical Director, Ian Levy, was recently targeted for a prank.