DNS

University will ‘pull the plug’ to test Nutanix disaster recovery

The University of Reading’s IT team plans to “pull the plug” on its Nutanix-based infrastructure to test disaster recovery (DR) readiness after a move to the supplier’s NC2 cloud services. That’s according to head of operations Kevin Mortimer, who spoke to Computer Weekly at Nutanix’s .Next 2025 event in the US last week. The University of…

University will ‘pull the plug’ to test Nutanix disaster recovery Read More »

Secure Future Initiative reveals Microsoft staff focus

Every Microsoft employee now has a metric dubbed Security Core Priority tied directly to their performance review. This is among the changes the software giant has put in place to enforce security internally.  In a blog post outlining the steps the company has taken to harden internal security, Charles Bell, executive vice-president of Microsoft Security,…

Secure Future Initiative reveals Microsoft staff focus Read More »

A guide to DORA compliance

The Digital Operational Resilience Act (DORA) came into force on 16 January 2023. Following a two-year implementation period, from 17 January 2025, financial organisations must fully comply with the new regulation, which aims to ensure they remain resilient to severe operational digital disruption. The act covers a number of aspects of cyber resiliency, auditability, and…

A guide to DORA compliance Read More »

NCSC expands school cyber service to academies and private schools

The UK’s National Cyber Security Centre (NCSC) is expanding a free cyber defence service to all schools across the country, helping the heavily at-risk education sector enhance its resilience at no cost. The expansion follows a successful roll-out of the NCSC’s Protective Domain Name Service (PDNS) for schools in 2023, and the enhanced service will…

NCSC expands school cyber service to academies and private schools Read More »

Printing vulnerability affecting Linux distros raises alarm

A newly discovered series of four dangerous flaws in the Common Unix Printing System (Cups), which is used across virtually all GNU/Linux distros including Debian, Red Hat and SUSE, as well as Apple macOS and Google Chrome/Chromium among other things, is causing alarm bells to ring for security professionals over the potential scope of the…

Printing vulnerability affecting Linux distros raises alarm Read More »

NCSC and allies call out Russia’s Unit 29155 over cyber warfare

The UK’s National Cyber Security Centre (NCSC) and its counterpart bodies in the Five Eyes intelligence alliance have joined partners from Czechia, Estonia, Germany, Latvia and Ukraine to identify a Russian military cyber unit that has been conducting a sustained campaign of malicious activity over the past four years. Part of the Main Directorate of…

NCSC and allies call out Russia’s Unit 29155 over cyber warfare Read More »

RCE flaw and DNS zero-day top list of Patch Tuesday bugs

A critical remote code execution (RCE) vulnerability in Microsoft Message Queuing (MSMQ) stands out as the most serious issue patched by Microsoft in its June Patch Tuesday update, amid another lighter-than-usual drop comprising just over 50 issues. Tracked as CVE-2024-30080, and attributed to China-based researcher k0shl, the flaw enables a remote, unauthenticated party to execute…

RCE flaw and DNS zero-day top list of Patch Tuesday bugs Read More »

GCHQ to protect politicians and election candidates from cyber attacks

Political candidates, election officials and others at high risk of being targeted online are being offered protection against phishing and malware attacks in the run-up to the next UK general election. The move follows attempts by Russian intelligence services and hacking groups linked to China to target institutions, high-profile individuals and parliamentarians in the UK.…

GCHQ to protect politicians and election candidates from cyber attacks Read More »

Nominet and European counterparts link up on intelligence sharing

The UK’s internet domain registrar, Nominet, has joined up with its counterparts from across Europe to launch a top-level domain information sharing and analysis centre (TLD ISAC) with the aim of strengthening cyber security capabilities and resilience through increased collaboration among TLD operators. The other authorities joining Nominet to launch the European TLD ISAC are…

Nominet and European counterparts link up on intelligence sharing Read More »

ExtraHop open sources 16 million rows of threat domain data

Cloud-native network detection and response (NDR) specialist ExtraHop hopes to give security researchers and defenders a little extra help when it comes to defending against malware and botnet operations, by making its entire 16 million row domain generated by algorithm (DGA) dataset publicly available on GitHub. So-called DGAs are programs that use algorithmic generation to…

ExtraHop open sources 16 million rows of threat domain data Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top