Total results: 2443
Page 1 of 98
Filters
Topics
- Cyber Security (456)
- Research (405)
- Consulting (402)
- Technology, general (395)
- Whitepapers (238)
- Computer security (230)
- Technical advisories (224)
- Vulnerability (172)
- Cryptography (124)
- Tool Release (114)
- Hardware & Embedded Systems (112)
- Public tools (106)
- Threat Intelligence (106)
- General Consulting (93)
- Technology (85)
- Insights & Viewpoints (64)
- Public Reports (64)
- Digital Forensics and Incident Response (DFIR) (61)
- Presentations (56)
- Increasing regulatory & legislative requirements (53)
- iSec Partners (52)
- Assessments (50)
- Reverse Engineering (50)
- Tutorial/Study Guide (50)
- Growing threat landscape (45)
- Conferences (40)
- Regulations & Legislation (40)
- Machine Learning (39)
- Cloud Security (38)
- Securing our connected future (36)
- Cloud & Containerization (35)
- Patch notifications (35)
- VSR (32)
- Insight Space (28)
- North American Research (28)
- Uncategorized (28)
- Working life (26)
- Offensive Security & Artificial Intelligence (24)
- UK (24)
- Managed Detection & Response (22)
- Ransomware (22)
- Reducing Vulnerabilities at Scale (22)
- Research Paper (22)
- Fox-IT (19)
- Transport (19)
- Sustainability (18)
- Books (17)
- Detection and Threat Hunting (16)
- Standards (14)
- Third-Party Risk Management (14)
- Emerging Technologies (13)
- Vulnerability Research (13)
- Gender (12)
- Managed Detection & Response (MDR) (12)
- Public interest technology (12)
- 5G Security & Smart Environments (10)
- Artificial Intelligence (10)
- Gaming & Media (10)
- Inclusion and Diversity (10)
- NCC Conversations (10)
- Social issues (10)
- UK Research (10)
- Virtualization, Emulation, & Containerization (10)
- #eachforequal (9)
- Blockchain (9)
- Business Insights (9)
- Finance (9)
- Giving Back (9)
- Operational Technology (9)
- Politics (9)
- Talent and Careers (9)
- Risk Management & Governance (8)
- Corporate (7)
- Cyber as a Science (7)
- Fox-IT and European Research (7)
- General (7)
- Remediation (7)
- Supply Chain Management (7)
- Working Environment (7)
- Crises, Incident (6)
- Data, Telecom, IT (6)
- Health, Health Care, Pharmaceuticals (6)
- Security (6)
- #People - making the world safer and more secure (5)
- Crime (5)
- Engineering (5)
- Government (5)
- MXDR (5)
- Partnerships, cooperations (5)
- Telecom (5)
- Annual Research Report (4)
- Awards (4)
- Awards & Recognition (4)
- General data (4)
- IT Consulting (4)
- Law (4)
- Mental Health (4)
- Reports (4)
- Science, technology (4)
- APAC (3)
- Academic Partnership (3)
- Business enterprise (3)
- CYBERUK (3)
- Cars and traffic (3)
- Children, Youth (3)
- Corona (3)
- Data (3)
- Gender equality (3)
- Legacy Systems (3)
- People (3)
- School (3)
- Software Resilience (3)
- Technology Policy (3)
- Threat briefs (3)
- UK cyber security policy (3)
- USA (3)
- Crime, Law, Legal affairs (2)
- Crises (2)
- Crypto (2)
- DDoS Assured (2)
- Education (2)
- Expert Insights (2)
- Incident Response (2)
- Intern Projects (2)
- Legal affairs (2)
- Microsoft (2)
- Misinformation, Deepfakes, & Synthetic Media (2)
- PCI DSS (2)
- Politics, general (2)
- Public sector (2)
- Resources (2)
- Smart cities (2)
- Social issues, General (2)
- Sustainability/CSR (2)
- Teaching, Learning (2)
- University, University College (2)
- Webinar (2)
- escrow (2)
- future of cyber (2)
- (1)
- ADD (1)
- ADHD (1)
- Adult education (1)
- Alumni Network (1)
- Annual and interim reports (1)
- Asia Pacific Research (1)
- Business enterprise, General (1)
- CTFs/Microcorruption (1)
- Communication (1)
- Current events (1)
- Cyber Advice (1)
- Cyber Talent Development (1)
- Defence issues (1)
- Disclosure Policy (1)
- Economy (1)
- Economy, Finance (1)
- Educational sciences (1)
- Elections (1)
- Energy (1)
- Energy issues (1)
- Finance and Professional Services (1)
- Fintech (1)
- Fraud (1)
- Industry, manufacturing (1)
- Infrastructure (1)
- Investor Relations (1)
- IoT (1)
- LGBTQIA+ (1)
- Law, Justice (1)
- MDR (1)
- MISA (1)
- MVSS (1)
- Managed Detection and Response (1)
- Mental Wellbeing (1)
- Parliament (1)
- Petroleum, Oil, Gas (1)
- Pride (1)
- Radio, TV (1)
- Science, general (1)
- Secure Development Lifecycle (SDL) (1)
- Sentinel (1)
- Services, Consulting (1)
- Society (1)
- Solutions (1)
- Spa, fitness, well-being (1)
- Supply Chain (1)
- Telecommunication, mobile telephony (1)
- Training (1)
- Web services (1)
- collaboration (1)
- computer misuse act (1)
- critical national infrastructure (1)
- cyber resilience (1)
- deepfake (1)
- healthcare (1)
- hospital (1)
- legal (1)
- next generation talent (1)
- protocol_name (1)
- recruitment (1)
- remediate (1)
- remediation (1)
- remote working (1)
- security consultant (1)
- smart tvs (1)
- threatintel (1)
Sectors
- Research (1318)
- News (418)
- Blog Posts (255)
- Press Release (102)
- Case Studies (46)
- Financial Services (21)
- Transport (21)
- Public Sector & Government Services (17)
- Tech, Media & Telecoms (15)
- Whitepapers (15)
- Cyber Advice & Insights (13)
- Events (9)
- Healthcare (8)
- Energy & Utilities (7)
- Videos (7)
- Guides & Datasheets (6)
- Retail & Consumer Markets (6)
- Webinars (6)
- Education (5)
- Aviation & Aerospace (4)
- Manufacturing (4)
- Maritime (4)
- Software Vendors (3)
- (2)
- Legal & Professional Services (2)
- Commodities (1)
- Infographics (1)
- Software Resilience (1)
NCC Group partners with Empowering You to build powerful communities of female cyber security leaders
News Technology, general Consulting Computer security Securing our connected future #People - making the world safer and more secure Talent and Careers Inclusion and Diversity Gender We are delighted to continue our partnership with Empowering You, a unique cross-sector initiative in the UK, backed…
Case Study: Incident Response to a Nation
Case Studies Digital Forensics and Incident Response (DFIR) Software Vendors Situation NCC Group was approached by a customer who had noticed several suspicious connections originating from their network, destined for a customer of theirs. This customer had many contracts with foreign governments, p…
NCC Group Monthly Threat Pulse – Review of November 2024
New ransomware strain Ymir drives rising attack levels in November • Ransomware cases in November rose by 16% from October, with 565 attacks. • Akira was most active threat group, responsible for 15% of attacks. • Industrials remain most targeted sector, with 32% of attacks. • 78% of al…
Integrated Review: the UK’s future as a cyber power
News Technology, general Consulting Cyber Security UK Insights & Viewpoints Today, the UK government has published the conclusions of an Integrated Review conducted in 2020, a 100-page report which sets out a framework for the UK’s national security and international policy in the coming years. In a…
NCC Group Monthly Threat Pulse – Review of December 2024
Press Release Threat Intelligence December 2024 breaks records with the highest-ever monthly amount of ransomware events logged December represents the highest number of ransomware cases observed since NCC Group began monitoring ransomware activity in 2021, with 574 attacks. New threat actor Funksec…
Are you sitting comfortably? Don’t forget about security while working remotely
News Technology, general Consulting Most people will have got into the swing of working from home by now, and with daily routines, video conferences and regular breaks firmly established as part of the average working day, it’s important that keeping on top of personal security hygiene remains front…
Why we’ve changed our logo for Pride month
News Inclusion and Diversity NCC Conversations Each year, we change our logo to Pride colours on social media for the month of June as a way of showing our support for the LGBTQIA+ community and our LGBTQIA+ colleagues. We stand unequivocally for inclusion and the rights of the LGBTQIA+ community, w…
Reflections on the MOVEit Data Breach a Year on
This time last year, threat actors around the globe sought to take advantage of a vulnerability in the popular managed file transfer platform, MOVEit. Despite the tool being patched by its developers in May, one particular criminal group capitalised on any delay by organisations and businesses to pa…
The Lazarus group: 5 measures to reduce the risk of an attack
Blog Posts Threat Intelligence In this article NCC Group and Fox-IT recently identified a campaign within the network of a financial sector customer. The campaign, which we codenamed Grapevine, has strong indications that it may be the work of the Lazarus group. As a continuously adapting, par excel…
Preparing for the EU Cyber Resilience Act
Blog Posts Regulations & Legislation What is the Cyber Resilience Act (CRA)? As we await the Cyber Resilience Act's entry into force imminently, we examine the law, which is set to introduce a wide-ranging framework governing the cybersecurity of digital products sold in the EU. The draft Act sets o…
AI and Cyber Security: New Vulnerabilities CISOs Must Address
Blog Posts Artificial Intelligence With the rapid deployment of Artificial Intelligence (AI) and Large Language Models (LLM) across virtually every business sector and use case, CISOs are rightfully concerned. With any new technology comes new threats, and just as companies are developing, testing,…
NCC Group and modePUSH collaborate to enhance incident response services in North America
We are pleased to announce a collaboration with cyber forensics expert, modePUSH to add its rapid remediation and cloud forensics capabilities to our end-to-end incident response services for clients in North America. In today’s dynamic threat landscape, swift response to cyber threats is paramount.…
A Guide to HITRUST® Certification
Guides & Datasheets Regulations & Legislation Healthcare Introduction Healthcare is a top industry targeted by cyber thieves due to its wealth of patient data and exorbitant number of integrated technologies. One wouldn't have to look far to read about ransomware attacks on hospital systems—in 2018…
Ransomware in UK Local Government Bodies
Case Studies Ransomware Software Resilience Public Sector & Government Services The Evolution of Ransomware The rate of ransomware evolution has outpaced the security improvement efforts of many organisations, leading to resilience challenges cross-sectors. Local governments are no exception. Vastly…
What is the APEC CBPR?
Blog Posts Regulations & Legislation Assessments For organizations headquartered in the US and operating globally, there is a myriad of security and privacy requirements (standards, frameworks, and regulations) they must comply with. Each varies in the level of audit rigor, compliance oversight, and…
Cyber Security Review
Blog Posts What is a Cyber Security Review (CSR)? A house built on sand will not stand strong against the elements. Much like a security improvement plan will not build resilience against threats without first identifying the current level of cyber maturity. A CSR lays the foundations by providing a…
NCC Group Monthly Threat Pulse – May 2022
News Technology, general Consulting Computer security Growing threat landscape Ransomware attacks decreased by 18% in May, compared to previous month Industrials (31%), Consumer Cyclicals (22%) and Technology (10%) most targeted sectors Lockbit 2.0 (95 victims) most active threat actor, alongside Bl…
Reflecting on Cyber Security as a Risk in Private Equity: Three actions
Blog Posts Third-Party Risk Management Supply Chain Management Ransomware Financial Services “Why does cyber security matter in Private Equity now, and why is it increasingly more relevant?” That was the question we asked to kick-off our recent Private Equity (PE) Cyber Security Round Table event wh…
Internet of Thinks: Securing the Brain Computer Interface (BCI)
From our phones to our cars to our homes, we are realising the benefits of linking more and more aspects of our lives to the internet in a safe and secure manner. But what would happen if we could connect our brain to the internet? In our latest whitepaper, we explore this and more through the emerg…
How Can Cyber Security Adoption Accelerate the Growth of DeFi?
Blog Posts Crypto Financial Services In this article: Decentralised Finance (DeFi) will bring major disruption and adoption on a scale similar to that of cloud, social media, and the smartphone. As a technology, the blockchain is often presented as safe and transparent. However, there are vulnerabil…
PCI DSS v4.0: Explained
Guides & Datasheets Assessments Regulations & Legislation Retail & Consumer Markets Financial Services In this article On March 31, 2022, the PCI Data Security Standard (DSS) v3.2.1 was updated to v4.0. The new standard is not mandatory until March 31, 2024, when v3.2.1 sunsets, and some requirement…
Webinar: Securing Your App for Google's API Ecosystem
Webinars Third-Party Risk Management Learn more about Google's OAuth Verification. Google’s OAuth API Verification program requires developers of apps that use Gmail APIs to pass multiple levels of review, up to and including a Security Assessment by an independent third-party assessor. Curious abo…
Customer Story: MDR for Global Commodities Sector
Case Studies Managed Detection & Response (MDR) Digital Forensics and Incident Response (DFIR) Commodities Situation NCC Group’s Security Operations Center (SOC) identified a potentially dangerous threat for an organization operating in the global commodities sector. Upon receiving an alert during r…
Appointment of Lynn Fordham to NCC Group plc Board
Press Release Technology, general Consulting Computer security NCC Group has announced the appointment of Lynn Fordham as an independent non-executive director. Lynn joins the Board with effect from 1 September 2022. Lynn will become a member of NCC Group’s Audit, Cyber Security, Nomination and Remu…
The two driving forces in incident response
Author: Erik de Jong, Global Lead for Incident Response Fox-IT At Fox-IT, we’ve had an incident response practice for about 20 years. It started as a traditional forensics team dealing mainly with employee fraud and other insider threats and has morphed into a full-blown practice spanning the globe…