logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
  • How the combination of XDR and SIEM can improve SOC operations
  • MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
  • Cybercriminals Exploit Legitimate Websites for Credit Card Theft
  • Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33642 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33641 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33640 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33643 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33628 (magic_r300-2100m_firmware) 31 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Has the UK government been hacked

Posted on 23 May 2022

From malware.news

When it comes to top secret government IT systems, spyware is used for just one task – spying. So serious questions were raised when security researchers from the digital rights watchdog Citizen Lab detected potential spyware infections in UK government systems.

Read more…

Posted in News

Post navigation

Previous post: Cloudflare joins EU Cloud Code of Conduct, the path to trusted cloud services
Next post: PDF smuggles Microsoft Word doc to drop Snake Keylogger malware
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.