Sign up to receive an email when news and alerts are published to this website.
Subscribe-
Joint Guidance: Choosing Secure and Verifiable Technologies
- Posted May 09, 2024
- Technical Advisories
The National Cyber Security Centre has today released joint cyber security guidance regarding choosing secure and verifiable technologies, alongside international partners.
Read more -
Joint Guidance: Deploying AI Systems Securely
- Posted April 16, 2024
- Technical Advisories
The National Cyber Security Centre has today released joint cyber security guidance regarding deploying AI systems securely, alongside international partners.
Read more -
Joint fact sheet for critical infrastructure leaders on Volt Typhoon activity
- Posted March 20, 2024
- Technical Advisories
- Security Advisories
The NCSC and international partners are publishing a fact sheet relating to the cyber actor 'Volt Typhoon' specifically for critical national infrastructure leaders so they can better secure their assets against this activity.
Read more -
Joint Advisory: Multiple vulnerabilities within Ivanti Connect Secure and Ivanti Policy Secure gateways
- Posted March 01, 2024
- Technical Advisories
The NCSC and CERT NZ have today joined international partners to release a cyber security advisory in response to the active exploitation of multiple vulnerabilities within Ivanti Connect Secure and Ivanti Policy Secure gateways.
Read more -
Advisory: SVR cyber actors adapt tactics for initial cloud access
- Posted February 27, 2024
- Technical Advisories
- Cyber Security Alerts
An advisory published by the UK’s National Cyber Security Centre (NCSC UK) details recent tactics, techniques and procedures (TTPs) of the group commonly known as APT29, also known as Midnight Blizzard, the Dukes or Cozy Bear.
Read more -
Cyber Security Alert: CVEs affecting ConnectWise ScreenConnect
- Posted February 22, 2024
- Technical Advisories
- Cyber Security Alerts
The NCSC would like to draw your attention to two CVEs affecting all versions of ConnectWise ScreenConnect before 23.9.8. The NCSC is aware of open-source reporting of active exploitation and a proof of concept.
Read more