Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

23 June 2017

Montenegro targeted ahead of NATO accession

By Louise Taggart, Threat Intelligence Analyst at PwC It has recently been publicly revealed that the group known as APT 28 or Sofacy targeted the Montenegrin government in the run-up to the country’s accession to NATO, something that has been reported on previously in PwC’s subscription threat intelligence reporting. Lure...

Cloud Hopper Impact: Supply Chain Management & Procurement

By Cathy Brough, Enterprise & Supply Chain Risk Manager at PwC In a rapidly evolving world of threats, Operation Cloud Hopper has highlighted that information security is not only an IT priority, but also an increasing focus area within procurement and supply chain management, with hackers starting to exploit the...

14 June 2017

New world of cyber threats – the dark side of light

By Matt Wixey, ‎Cyber Threat and Vulnerability Management Consultant at PwC Leading the research function in PwC’s Threat and Vulnerability Management team in the UK is an interesting role. In my work I look to identify new cyber threats to organisations, one example of this is by developing proof-of-concept malware...

06 June 2017

TrickBot's bag of tricks

By Bart Parys My name is Bart Parys and I work as a Threat Intelligence Analyst at PwC. I spend a lot of my time focused on researching targeted attacks and advanced persistent threat (APT) actors, but I also research some opportunistic cybercrime, including ransomware and banking trojans. The banking...

31 May 2017

The phenomenon of ‘election hacking’

By Louise Taggart, Threat Intelligence Analyst at PwC A new phenomenon has gripped the media narrative around the cyber security of a number of contemporary elections; that of ‘election hacking’. Allegations and rumours were rife in the run-up to the US presidential election in 2016 that foreign entities were seeking...

30 May 2017

IOT3 – Internet of Things, Threats and Terrestrials

By Dr Wendy Ng The Internet of Things (IoT1) From smartphones to vehicles, and medical devices to networked lightbulbs, connected devices have been instrumental in improving productivity, convenience and user experience over the past decade. And arguably we’re still just at the beginning. Connected devices could also be the single...

26 May 2017

Hackers Get Hungry

By Gabriel Currie, ‎Cyber Threat Detection & Response Consultant at PwC How extended lunch breaks helped us identify one of the largest cyber espionage campaigns ever seen Our threat intelligence team recently released a report on cyber espionage group APT10 and their targeting of managed IT service providers around the...

12 May 2017

NHS cyber attacks – preventing and handling ransomware

As widely reported in the media, there has been a significant wave of ransomware attacks against a large number of NHS bodies and their access to data held on computer systems. NHS Digital has stated that it is working closely with the National Cyber Security Centre, the Department of Health...

09 May 2017

Quantifying Your Cyber Risk (Part 2 of 3)

By Domenico del Re, Director, Financial Loss Modelling & Michael Woods, Cyber Security Senior Manager at PwC What does it take to create a cyber risk currency that will allow you to measure, manage and transfer your cyber risk? In our first blog of this series, we set out the...

08 May 2017

New podcast series: "The New Realities of Cyber Security"

By Ian Todd, Cyber Security Consultant Welcome to the New Realities of Cyber Security podcast series. In this series, we’ll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to the General Data Protection Regulation,...