News
Page updated: 21 April 2026
This page consists of a “One Stop” for freely available information to help in your threat and vulnerability management tasks.
NCSC: Threat Reports
-
Impact of AI on cyber threat from now to 2027
Source: NCSC Published on 2025-05-02
-
A method to assess 'forgivable' vs 'unforgivable' vulnerabilities
Source: NCSC Published on 2025-01-28
-
The near-term impact of AI on the cyber threat
Source: NCSC Published on 2024-01-25
-
The near-term impact of AI on the cyber threat
Source: NCSC Published on 2024-01-22
-
Cyber Threat Report: UK Legal Sector
Source: NCSC Published on 2023-06-22
-
The threat from commercial cyber proliferation
Source: NCSC Published on 2023-04-19
-
ACD - The Sixth Year
Source: NCSC Published on 2023-04-18
-
Threat Report 24th March 2023
Source: NCSC Published on 2023-03-24
-
Threat Report 10th March 2023
Source: NCSC Published on 2023-03-10
-
Threat Report 24th February 2023
Source: NCSC Published on 2023-02-24
-
Threat Report 10th February 2023
Source: NCSC Published on 2023-02-10
-
Threat Report 27th January 2023
Source: NCSC Published on 2023-01-30
-
Threat Report 13th January 2023
Source: NCSC Published on 2023-01-13
-
Threat Report 22nd December 2022
Source: NCSC Published on 2022-12-22
-
Threat Report 9th December 2022
Source: NCSC Published on 2022-12-09
Tenable: Cyber Exposure Alerts
-
Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)
Source: Tenable Published on 2026-04-14
-
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure
Source: Tenable Published on 2026-04-09
-
CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild
Source: Tenable Published on 2026-04-06
-
The developer credential economy: Why exposure data is the new front line in the supply chain war
Source: Tenable Published on 2026-04-03
-
Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069
Source: Tenable Published on 2026-04-01
-
CVE-2026-21992: Critical Out-of-Band Oracle Identity Manager and Oracle Web Services Manager Remote Code Execution Vulnerability
Source: Tenable Published on 2026-03-20
-
FAQ on CVE-2026-21514: OLE bypass N-Day in Microsoft Word
Source: Tenable Published on 2026-03-17
-
Operation Epic Fury: Why exposure data changes everything about Iran's cyber-kinetic campaign
Source: Tenable Published on 2026-03-17
-
Cyber Retaliation: Analyzing Iranian Cyber Activity Following Operation Epic Fury
Source: Tenable Published on 2026-03-11
-
Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
Source: Tenable Published on 2026-03-10
-
Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations
Source: Tenable Published on 2026-03-03
-
CVE-2026-20127: Cisco Catalyst SD-WAN Controller/Manager Zero-Day Authentication Bypass Vulnerability Exploited in the Wild
Source: Tenable Published on 2026-02-25
-
Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513)
Source: Tenable Published on 2026-02-10
-
Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513)
Source: Tenable Published on 2026-02-10
-
Frequently Asked Questions About Notepad++ Supply Chain Compromise
Source: Tenable Published on 2026-02-03
CISA: Cyber Threat Intelligence
-
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
Source: CISA Published on 2026-04-06
-
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
Source: CISA Published on 2025-12-05
-
CISA Shares Lessons Learned from an Incident Response Engagement
Source: CISA Published on 2025-09-22
-
CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization
Source: CISA Published on 2025-07-29
-
#StopRansomware: Interlock
Source: CISA Published on 2025-07-21
-
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider
Source: CISA Published on 2025-06-12
-
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
Source: CISA Published on 2025-05-20
-
Russian GRU Targeting Western Logistics Entities and Technology Companies
Source: CISA Published on 2025-05-12
-
Fast Flux: A National Security Threat
Source: CISA Published on 2025-04-01
-
#StopRansomware: Medusa Ransomware
Source: CISA Published on 2025-03-11
-
#StopRansomware: Ghost (Cring) Ransomware
Source: CISA Published on 2025-02-19
-
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
Source: CISA Published on 2025-01-15
-
2023 Top Routinely Exploited Vulnerabilities
Source: CISA Published on 2024-11-08
-
Microsoft Releases October 2024 Security Updates
Source: CISA Published on 2024-10-08
-
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
Source: CISA Published on 2024-09-30
Our Services that can directly help, benefit, your organisation with mitigating the issues presented above
