It’s an old one but a good one. Protecting you kids online
I think it is time to update the Rabbit to the new OS, looks interesting. Hopefully, it will move me away from using it as a paper weight!
Interesting read for a Sunday - Fugitive, Traitor, Soldier or Spy - www.gq-magazine.co.uk/article/d…
The NCSC encourages collaboration between quantum and cyber sectors to shape secure architectures for future quantum networks, aligning with the UK’s 2035 quantum mission goals - NCSC
NCSC UK updates - “How to identify and protect against the risks associated with sensitive personal information in your data holdings.
Denmark is doing the right thing Denmark to tackle deepfakes by giving people copyright to their own features | Deepfake | The Guardian
M&S calls for mandatory ransomware reporting | Computer Weekly
Marks & Spencer chairman Archie Norman has described the recent ransomware attack on the retailer’s systems as something akin to an “out-of-body experience” as he called for cyber attack victims to be brave, bite the bullet, and be open and transparent about their experiences.
Open letters to Third Party Suppliers
It has been a couple of weeks of open letters to suppliers :
Big moves from Microsoft Notepad Microsoft is updating Notepad with text formatting and Markdown support | The Verge
The stolen iPhone market
Inside the Stolen iPhone Market 📲
it is one of the most important nodes in a supply chain for second-hand technology that starts in the west, travels through wholesalers in Hong Kong and on to markets in mainland China and the global south.
Guidelines for secure AI design and development
Guidelines for providers of AI systems, whether custom-built or built on top of external tools and services. NCSC guidelines
Defending Against UNC3944 AKA Scattered Spider
Defending Against UNC3944 AKA Scattered Spider
To counter UNC3944, organizations need robust defenses involving identity verification and advanced authentication methods. Implementing phishing-resistant multi-factor authentication (MFA), minimizing reliance on SMS for authentication, and eliminating publicly available personal data verification are practical steps. Secure the identity verification process with methods like on-camera checks to thwart impersonation attempts.
Training staff to identify and respond to unusual IT requests is crucial. This includes understanding ploys like fake IT calls, email phishing attempts, and odd requests for credential verification, which are characteristic of UNC3944 operations.
A lot of customers will be watching to see what happens with Tata after being linked to another beach - M&S