News
Page updated: 22 April 2025
This page consists of a “One Stop” for freely available information to help in your threat and vulnerability management tasks.
NCSC: Threat Reports
-
A method to assess 'forgivable' vs 'unforgivable' vulnerabilities
Source: NCSC Published on 2025-01-28
-
The near-term impact of AI on the cyber threat
Source: NCSC Published on 2024-01-25
-
The near-term impact of AI on the cyber threat
Source: NCSC Published on 2024-01-22
-
Cyber Threat Report: UK Legal Sector
Source: NCSC Published on 2023-06-22
-
The threat from commercial cyber proliferation
Source: NCSC Published on 2023-04-19
-
ACD - The Sixth Year
Source: NCSC Published on 2023-04-18
-
Threat Report 24th March 2023
Source: NCSC Published on 2023-03-24
-
Threat Report 10th March 2023
Source: NCSC Published on 2023-03-10
-
Threat Report 24th February 2023
Source: NCSC Published on 2023-02-24
-
Threat Report 10th February 2023
Source: NCSC Published on 2023-02-10
-
Threat Report 27th January 2023
Source: NCSC Published on 2023-01-30
-
Threat Report 13th January 2023
Source: NCSC Published on 2023-01-13
-
Threat Report 22nd December 2022
Source: NCSC Published on 2022-12-22
-
Threat Report 9th December 2022
Source: NCSC Published on 2022-12-09
-
Threat Report 25th November 2022
Source: NCSC Published on 2022-11-25
Tenable: Cyber Exposure Alerts
-
CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability
Source: Tenable Published on 2025-04-18
-
Frequently Asked Questions About the MITRE CVE Program Expiration and Renewal
Source: Tenable Published on 2025-04-16
-
Oracle April 2025 Critical Patch Update Addresses 171 CVEs
Source: Tenable Published on 2025-04-16
-
MITRE CVE Program Funding Set To Expire
Source: Tenable Published on 2025-04-15
-
Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)
Source: Tenable Published on 2025-04-08
-
CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514: Frequently Asked Questions About IngressNightmare
Source: Tenable Published on 2025-03-24
-
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware
Source: Tenable Published on 2025-03-13
-
Microsoft’s March 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)
Source: Tenable Published on 2025-03-11
-
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited
Source: Tenable Published on 2025-03-04
-
Frequently Asked Questions About DeepSeek Large Language Model (LLM)
Source: Tenable Published on 2025-02-13
-
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)
Source: Tenable Published on 2025-02-11
-
CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited
Source: Tenable Published on 2025-01-23
-
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Source: Tenable Published on 2025-01-23
-
Oracle January 2025 Critical Patch Update Addresses 186 CVEs
Source: Tenable Published on 2025-01-22
-
CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild
Source: Tenable Published on 2025-01-14
CISA: Cyber Threat Intelligence
-
Fast Flux: A National Security Threat
Source: CISA Published on 2025-04-01
-
#StopRansomware: Medusa Ransomware
Source: CISA Published on 2025-03-11
-
#StopRansomware: Ghost (Cring) Ransomware
Source: CISA Published on 2025-02-19
-
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
Source: CISA Published on 2025-01-15
-
2023 Top Routinely Exploited Vulnerabilities
Source: CISA Published on 2024-11-08
-
Microsoft Releases October 2024 Security Updates
Source: CISA Published on 2024-10-08
-
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
Source: CISA Published on 2024-09-30
-
CISA Adds One Known Exploited Vulnerability to Catalog
Source: CISA Published on 2024-09-19
-
Russian Military Cyber Actors Target US and Global Critical Infrastructure
Source: CISA Published on 2024-09-04
-
#StopRansomware: RansomHub Ransomware
Source: CISA Published on 2024-08-29
-
Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations
Source: CISA Published on 2024-08-23
-
Best Practices for Event Logging and Threat Detection
Source: CISA Published on 2024-08-20
-
CISA Adds Six Known Exploited Vulnerabilities to Catalog
Source: CISA Published on 2024-08-12
-
North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs
Source: CISA Published on 2024-07-24
-
CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
Source: CISA Published on 2024-07-09
Our Services that can directly help, benefit, your organisation with mitigating the issues presented above