Latest news and media 30 Jan 2025 News Using Content Credentials to help mitigate cyber threats associated with generative AI With advanced AI tools, digital media can be created or modified convincingly with minimal effort and cost. Learn more about media provenance solutions to help end users verify the integrity of your organisation’s content. 22 Jan 2025 News "Bulletproof" hosting providers are not so bulletproof Many cybercriminals rely on Bulletproof Hosting (BPH) providers to carry out their unlawful activities. Read our new publication to find out more about the role that BPH providers play in the cybercrime ecosystem. 14 Jan 2025 News New Secure by Demand guidance available for operational technology owners and operators To protect your systems from threat actors targeting your operational technology components, select products from manufacturers who are Secure-by-Design. Find out which security elements to prioritise. All news and media Title TypeNews AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 6121824- All - 30 Jan 2025 News Using Content Credentials to help mitigate cyber threats associated with generative AI With advanced AI tools, digital media can be created or modified convincingly with minimal effort and cost. Learn more about media provenance solutions to help end users verify the integrity of your organisation’s content. 22 Jan 2025 News "Bulletproof" hosting providers are not so bulletproof Many cybercriminals rely on Bulletproof Hosting (BPH) providers to carry out their unlawful activities. Read our new publication to find out more about the role that BPH providers play in the cybercrime ecosystem. 14 Jan 2025 News New Secure by Demand guidance available for operational technology owners and operators To protect your systems from threat actors targeting your operational technology components, select products from manufacturers who are Secure-by-Design. Find out which security elements to prioritise. 10 Dec 2024 News Limited use obligation is now law On 29 November 2024, the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 became law. 05 Dec 2024 News Do you purchase technology for your organisation? Updated guidance and new guidance for executives now available for Choosing secure and verifiable technologies. 04 Dec 2024 News Cyber threat actors compromising networks of major global telecommunications providers New guidance is available for network defenders of communications infrastructure to strengthen visibility and harden devices against PRC-affiliated and other malicious cyber actors. Pagination Page 1 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats