CERT specific news

CERT announcements

  

RT @adulau: If someone tell you that SSH key materials are never reused on servers, someone is lying to you… https://t.co/WYUbaUr0ib – i…

RT @adulau: If someone tell you that SSH key materials are never reused on servers, someone is lying to you…

  

RT @GSMA: Final chance to register for the #GSMA T-ISAC MISP virtual workshop with @circl_lu! Learn how to input #telco related #cyber th…

RT @GSMA: Final chance to register for the #GSMA T-ISAC MISP virtual workshop with @circl_lu! Learn how to input #telco

  

“A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_ur… https://t.co/8mlNhTcSaK

“A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_ur…

  

@AusCERT @Misp This is really cool, automation and fast information sharing in @MISPProject is always a gain for the defenders.

@AusCERT @Misp This is really cool, automation and fast information sharing in @MISPProject is always a gain for the defenders.CIRCL

  

“Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow a… https://t.co/eRzSE0TkuG

“Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow a… https://t.co/eRzSE0TkuGCIRCL Luxembourg –

  

In case you didn’t patch CVE-2020-14841 because the CVSS is 7.5 😉 https://t.co/OdhaxmqPXX

In case you didn’t patch CVE-2020-14841 because the CVSS is 7.5 😉 https://t.co/OdhaxmqPXXCIRCL Luxembourg – Computer Incident Response Center Luxembourg

  

Home learning technology: securing tools for remote education

Guidance to help schools provide secure remote learning tools for pupils, students and staff.NCSC FeedRead More

  

Active Cyber Defence (ACD) – The Third Year

The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence

  

Weekly Threat Report 26th February 2021

The NCSC’s weekly threat report is drawn from recent open source reporting.NCSC FeedRead More

  

Erasing data from donated devices

How charities can erase personal data from donated laptops, phones and tablets, before passing them on.NCSC FeedRead More

  

Home learning: advice for parents and carers

How to set up (and use) second-hand devices for online home learning.NCSC FeedRead More

  

Vulnerability Scanning Tools and Services

Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes.NCSC FeedRead More

  

Vulnerability Scanning: Keeping on top of the most common threats

Vulnerability Scanning solutions offer a cost-effective way to discover and manage common security issues.NCSC FeedRead More

  

Weekly Threat Report 22nd January 2021

The NCSC’s weekly threat report is drawn from recent open source reporting.NCSC FeedRead More

  

Cross domain security

How to safely exchange information between systems and organisations.NCSC FeedRead More

  

Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking

Technical report on best practice use of this fundamental data routing protocol.NCSC FeedRead More

  

Second call for Academic Centres of Excellence in Cyber Security Education

Universities are invited to join the ACE-CSE programme, recognising excellence in the delivery of cyber security education.NCSC FeedRead More

  

Can you help improve the Cyber Security Toolkit for Boards?

Your chance to be part of the research that will shape the next iteration of the NCSC’s Board Toolkit.NCSC FeedRead

   

Újabb kórház a zsarolóvírusok kereszttüzében

Január 17-én vasárnap zsarolóvírus támadás érte a belga CHwapi kórházat, ahol a támadás következtében beavatkozásokat kellett elhalasztani és betegeket kellett átirányítani más intézményekbe. Az intézmény jelentése szerint a támadás vasárnap este 20:45 perc körül érte a kórházat, és több, mint 80 eszköz még mindig titkosítva van. Az üzemeltető személyzet próbálkozásai az irányítás visszaszerzésére jelenleg hatástalanok. Az eset furcsasága, hogy a zsarolóvírusokra egyáltalán nem jellemző módon, a támadók egyelőre nem követeltek váltságdíjat, illetve adatlopás nyomait sem fedezték még fel a szakértők.

  

Buying and selling second-hand devices

How to erase the personal data from your phone, tablets, and other devices (and why it’s important when you’re buying

  

Erasing personal data from second-hand devices

Introducing our new guidance: essential steps to follow when you’re buying (or selling) used electronic devicesNCSC FeedRead More

  

Cyber security for farmers

Guidance to help farmers improve the security and resilience of their business against cyber threats.NCSC FeedRead More

  

Weekly Threat Report 8th January 2021

The NCSC’s weekly threat report is drawn from recent open source reporting.NCSC FeedRead More