The UK’s National Cyber Security Centre with it’s partners in the Five Eyes, has issued an advisory for the top exploited software vulnerabilities in 2021 – meaning they could continue being the top exploits in 2022. 2021 Top Routinely Exploited Vulnerabilities | CISA Microsoft Exchange server, VMware, SonicWall and Log4j …
Big Tech – should there be limits? UPDATED 26 April 2022
This post was first published on 23 April 2022 Here is a story from the EU that goes hand-in-hand with the UK Government’s Online Safety legislation: EU agrees rules to force big tech to rein in illegal content or face huge fines | European Union | The Guardian Update 26 …
Continue reading “Big Tech – should there be limits? UPDATED 26 April 2022”
Inside a commercial spyware company
Following the story this week that No. 10 Downing Street and the Foreign and Commonwealth Office were infected with the Pegasus spyware, Bruce Schneier put me onto this article about the NSO Group and Pegasus spyware. It provides some amazing background into the way the software has developed and how …
NCSC joins other international cybersecurity organisations in issuing fresh advice on the threats due to the Russia Ukraine Conflict 21 April 2022
Cyber security organisations around the world have issued joint advisories to organisations and individuals about the developing threats from the Russia Ukraine Conflict. UK joins international partners to issue advice on latest… – NCSC.GOV.UK CISA, FBI, NSA, and International Partners Issue Advisory on Demonstrated Threats and Capabilities of Russian State-Sponsored …
Why the Prime Minister needs to be told to “pay close attention” to cybersecurity
I know the job of Prime Minister is a demanding one, add to that Brexit, a difficult economy, keeping up with all the issues about COVID-19, Ukraine, etc. but basic security and with that basic cybersecurity is something that naturally should be a key part of how he conducts himself. …
Continue reading “Why the Prime Minister needs to be told to “pay close attention” to cybersecurity”