The National Cyber Security Centre (NCSC) this week marked its first year of operation by revealing a snapshot of its findings from the past 12 months.
The recent NCA report shows how easy it is for young people to slip down the path of cybercrime. The barrier to entry in the cyber crime market is at an all-time low with the tools needed to create new ransomware attacks available for free online. There are videos, tutorials, and blogs all detailing how to make money usually in the form of anonymous crypto currencies such as bitcoin.
A few weeks ago, I happened to listen to a radio programme on how punctuation came to exist. This remarkably interesting half hour revealed to me how something that we now see as finished, complete, and solid is in fact the result of invention, evolution, and technical advance.
The issue of unquoted paths for services has been around for over 15 years. Despite this there is another potential privilege escalation with unquoted paths which doesn't get as much coverage, these are Scheduled Tasks.
The correct method of dealing with a data breach contains many actions including containment, employee engagement and making sure it never happens again, but part of your plan should include planning how to get your message out there and let your investors and customers know what the latest status is.
Last week the UK Government launched the Cyber Essentials Scheme (CES) allowing businesses to demonstrate best practice in defending against common cyber threats.