Article: Understanding Software as a Service (SaaS) security - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/understanding-software-service-saas-security Published: 2019 05 07 15:25:34 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Ransomware: 'WannaCry' guidance for enterprise administrators - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/ransomware-wannacry-guidance-enterprise-administrators-1 Published: 2019 05 07 15:21:03 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Sextortion emails: how to protect yourself - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/sextortion-scams-how-to-protect-yourself Published: 2019 05 07 15:15:00 Received: 2024 05 13 07:20:21 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: Active Cyber Defence - tackling cyber attacks on the UK - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/active-cyber-defence-tackling-cyber-attacks-uk Published: 2019 05 07 15:15:00 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Growing positive security cultures - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/growing-positive-security-cultures Published: 2019 05 07 14:41:20 Received: 2025 01 08 18:41:56 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Maturity models in cyber security: what's happening to the IAMM? - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2019 05 07 14:20:52 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Of mice and cyber - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/mice-and-cyber Published: 2019 05 07 14:20:09 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NCSC IT: How the NCSC built its own IT system - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ncsc-it-how-ncsc-built-its-own-it-system-0 Published: 2019 05 07 14:11:45 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Ready, Set... Android Go? - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ready-set-android-go Published: 2019 05 07 13:52:38 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: SaaS security - surely it's simple? - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/saas-security-surely-its-simple Published: 2019 05 07 13:50:12 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Approaching enterprise technology with cyber security in mind - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind Published: 2019 05 07 12:52:32 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: BT's proactive protection: Supporting the NCSC to make our customers safer - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/bts-proactive-protection-supporting-ncsc-make-our-customers-safer Published: 2019 05 07 03:06:16 Received: 2024 05 13 07:21:25 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Introducing Data Security: Why is it Important for Every Organization? - published almost 6 years ago. Content: http://www.ehacking.net/2019/05/introducing-data-security-why-is-it.html Published: 2019 05 06 10:22:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Of mice and cyber - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/mice-and-cyber Published: 2019 05 05 14:20:09 Received: 2024 04 12 13:21:17 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: I'm gonna stop you, little phishie... - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/im-gonna-stop-you-little-phishie Published: 2019 05 03 09:11:17 Received: 2024 05 25 05:03:07 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Weekly Threat Report 3rd May 2019 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-may-2019 Published: 2019 05 02 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Ready, Set... Android Go? - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ready-set-android-go Published: 2019 05 02 09:20:13 Received: 2024 02 16 10:42:36 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Secure systems design: new guidance and security paper now available - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/secure-systems-design--new-guidance-now-available Published: 2019 05 01 10:35:40 Received: 2024 01 31 09:21:10 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Machine Learning: How It Works - published almost 6 years ago. Content: https://www.securitymagazine.com/articles/90173-machine-learning-how-it-works Published: 2019 05 01 04:00:00 Received: 2021 09 10 20:00:05 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
![]() |
Article: Exercise in a Box: Fitness tracking - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking Published: 2019 04 29 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: VulnTrack 1.1 by Ogma Released - published almost 6 years ago. Content: https://www.soldierx.com/news/VulnTrack-11-Ogma-Released Published: 2019 04 27 19:51:45 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Import data, not malware - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/import-data-not-malware Published: 2019 04 27 17:00:00 Received: 2023 05 11 08:21:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Oracle Security Alert for CVE-2019-2725 - 26 Apr 2019
- published almost 6 years ago. Content: https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html Published: 2019 04 26 17:00:00 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Operational technologies - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/operational-technologies Published: 2019 04 26 16:39:04 Received: 2024 08 08 13:01:06 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Weekly Threat Report 26th April 2019 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-26th-april-2019 Published: 2019 04 25 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CARBANAK Week Part Four: The CARBANAK Desktop Video Player - published almost 6 years ago. Content: Part One, Part Two and Part Three of CARBANAK Week are behind us. In this final blog post, we dive into one of the more interesting tools that is part of the CARBANAK toolset. The CARBANAK authors wrote their own video player and we happened to come across an interesting video capture from CARBANAK of a network operator preparing for an... http://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-four-desktop-video-player.html Published: 2019 04 25 09:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: CYBERUK 2019: First day highlights - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2019-first-day-highlights Published: 2019 04 24 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CARBANAK Week Part Three: Behind the CARBANAK Backdoor - published almost 6 years ago. Content: We covered a lot of ground in Part One and Part Two of our CARBANAK Week blog series. Now let's take a look back at some of our previous analysis and see how it holds up. In June 2017, we published a blog post sharing novel information about the CARBANAK backdoor, including technical details, intel analysis, and some interesting deductions ... http://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-three-behind-the-backdoor.html Published: 2019 04 24 17:30:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Operational technologies - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/operational-technologies Published: 2019 04 24 11:32:48 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis - published almost 6 years ago. Content: FireEye has observed the certificate most recently being served on the following IPs (Table 4): IP Hostname Last Seen 104.193.252.151:443 vds2.system-host[.]net 2019-04-26T14:49:12 185.180.196.35:443 customer.clientshostname[.]com 2019-04-24T07:44... http://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-two-continuing-source-code-analysis.html Published: 2019 04 23 17:45:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Windows 10 egghunter (wow64) and more - published almost 6 years ago. Content: https://www.corelan.be/index.php/2019/04/23/windows-10-egghunter/?utm_source=rss&utm_medium=rss&utm_campaign=windows-10-egghunter Published: 2019 04 23 13:30:20 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
![]() |
Article: CYBERUK 2019: Growing cyber in the UK - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2019-growing-cyber-in-the-uk Published: 2019 04 22 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Logging made easy (LME) - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/logging-made-easy Published: 2019 04 22 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CYBERUK 2019: Growing cyber in the UK - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2019-growing-cyber-in-the-uk Published: 2019 04 22 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Logging made easy (LME) - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/logging-made-easy Published: 2019 04 22 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: CARBANAK Week Part One: A Rare Occurrence - published almost 6 years ago. Content: It is very unusual for FLARE to analyze a prolifically-used, privately-developed backdoor only to later have the source code and operator tools fall into our laps. Yet this is the extraordinary circumstance that sets the stage for CARBANAK Week, a four-part blog series that commences with this post. CARBANAK is one of the most full-featured bac... http://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html Published: 2019 04 22 17:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: CYBERUK 2019: A view from the auditorium - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk2019-view-from-auditorium Published: 2019 04 21 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Click to Open Code Editor