National Cyber Security Centre Cyber Action Plan to help increasingly digital small businesses stay secure from rising threats
As part of the Cyber Aware campaign, a self-assessment tool for sole traders and micro businesses has been developed.
Over half of UK businesses have shifted to remote working since the start of the pandemic
Free online service from the National Cyber Security Centre gives Cyber Aware advice tailored to individual circumstances
Bespoke advice to help small businesses combat rising online threats is being offered through a state-of-the-art digital tool launched today (26 February) by the UK’s leading cyber security experts.
As part of the cross-government Cyber Aware campaign, GCHQ’s National Cyber Security Centre (NCSC) has created the Cyber Action Plan to help micro businesses and sole traders securely navigate the increasingly digital landscape they operate in.
Ryuk ransom note (Source: Coveware, Malwarebytes)
Prolific Ryuk ransomware has a new trick up its sleeve. The developers behind the notorious strain of crypto-locking malware have given their attack code the ability to spread itself between systems inside an infected network. A Ryuk sample with worm-like capabilities - allowing it to spread automatically within networks it infects - was discovered during an incident response handled by ANSSI in early 2021, according to a Ryuk report issued Thursday by CERT-FR, the French government s computer emergency readiness team that s part of the National Cybersecurity Agency of France, or ANSSI.
Specifically, the worm-like behavior is achieved through the use of scheduled tasks, via which the malware propagates itself - machine to machine - within the Windows domain, CERT-FR says. Once launched, it will thus spread itself on every reachable machine on which Windows RPC accesses are possible. Remote procedure calls are a mechanism fo
Government Sites Said to Have Critical Vulnerabilities; NCIIPC and CERT-in Step In: Reports
The vulnerabilities reportedly exposed sensitive files, credentials, and police FIRs. By Shayak Majumder | Updated: 22 February 2021 19:36 IST
Photo Credit: Pexels/ Mati Mango
The critical issues included over 13,000 identifiable information instances
Highlights
US DoD Vulnerability Disclosure Program was involved to raise concerns
NCSC says remedial actions have been taken
Security researchers said they found thousands of critical vulnerabilities in dozens of government-run Web services, more than half of which reportedly belonged to state governments. Most of the services had multiple issues that included exposed credentials, leaks of sensitive files, and existence of known bugs. If exploited, these lapses could reportedly lead to deeper access within the government network, as per the researchers. The issues had been brought under the notice of the
Get Permission
The National Counterintelligence and Security Center is calling attention to China s ongoing efforts to collect DNA data sets and other sensitive health data of Americans through hacking and other methods.
The collection of PII, personal health information and large genomic data sets gives China vast opportunities to precisely target individuals in foreign governments, private industries or other sectors for surveillance, manipulation or extortion, the NCSC warns.
The NCSC alert comes on the heels of a 60 Minutes CBS television segment Sunday featuring William Evanina, the former director of the NCSC, who estimated that 80% of American adults have had their personally identifiable information “stolen” by China.