Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Defence
  • /
  • UK and allies warn of cyber attack vulnerabilities

Defence Security

UK and allies warn of cyber attack vulnerabilities

The UK and international allies issued an alert yesterday, showing an increase in cyber attackers initially exploiting previously unknown vulnerabilities to compromise enterprise networks.

Above: The National Cyber Security Centre (NCSC), Nova South, London.
Image by Simona Flamigni / copyright Shutterstock

In a new advisory, the National Cyber Security Centre (NCSC) – a part of GCHQ – alongside partners in Australia, Canada, New Zealand and the United States, shared a list of the top 15 routinely exploited vulnerabilities of 2023.

Advertisement
ODU RT

Of these vulnerabilities, the majority were first exploited as zero-days – weaknesses that were recently discovered and where a fix or patch was not immediately available from the vendor – allowing attackers to conduct cyber operations against higher-priority targets.

This trend, which the NCSC has continued to observe into 2024, marks a shift from 2022 when less than half of the top list was initially exploited as zero-day vulnerabilities.

The advisory strongly encourages enterprise network defenders to maintain vigilance with their vulnerability management processes, including applying all security updates in a timely manner and ensuring they have identified all assets in their estates.

It also calls on technology vendors and developers to follow advice on implementing secure-by-design principles into their products to help reduce the risk of vulnerabilities being introduced at source and being exploited later.

Ollie Whitehouse, NCSC Chief Technology Officer, said: “More routine initial exploitation of zero-day vulnerabilities represents the new normal which should concern end-user organisations and vendors alike as malicious actors seek to infiltrate networks.  

“To reduce the risk of compromise, it is vital all organisations stay on the front foot by applying patches promptly and insisting upon secure-by-design products in the technology marketplace.

“We urge network defenders to be vigilant with vulnerability management, have situational awareness in operations and call on product developers to make security a core component of product design and life-cycle to help stamp out this insidious game of whack-a-mole at source”.

All vulnerabilities listed have had patches and fixes made available from the vendors to help mitigate the risk of compromise.

Advertisement
PTC rectangle

In the case of zero-day vulnerabilities, where exploitation is rife it is vital organisations have a process in place to install vendor updates at pace after they become available to minimise the opportunity for attackers.

In addition to the top list, the advisory also details a further 32 vulnerabilities that were routinely exploited in 2023.

If mitigation steps have not already been taken, network defenders should follow vendor advice in each case and check for indicators of compromise before applying updates.

Advisory jointly published by:

  • NCSC
  • US Cybersecurity and Infrastructure Security Agency (CISA)
  • US Federal Bureau of Investigation (FBI)
  • US National Security Agency (NSA)
  • Australian Signals Directorate’s Australian Cyber Security Centre (ACSC),
  • Canadian Centre for Cyber Security (CCCS)
  • New Zealand National Cyber Security Centre (NCSC-NZ)
  • Computer Emergency Response Team New Zealand (CERT NZ)


View full advisory on CISA's website

Advertisement
FIA2026 animated banner
GA-ASI’s UK and Japan MQ-9B Programs recognised

Defence

GA-ASI’s UK and Japan MQ-9B Programs recognised

25 March 2026

General Atomics Aeronautical Systems, Inc. (GA-ASI) won two awards during Aviation Week’s 21st annual Program Excellence Awards last week, with its United Kingdom (UK) Protector Program given the Special Projects Award, whilst its Japan COCO (Company-Owned, Company-Operated) Program won in the category of OEM System Sustainment.

UK Defence Diplomacy Strategy launched

Defence

UK Defence Diplomacy Strategy launched

24 March 2026

UK military personnel will be put through their paces as part of a new diplomacy training programme, upskilling specialists in negotiation and languages as part of the UK's first Defence Diplomacy Strategy launched today. 

DroneShield and OpenWorks Engineering expand C2 interoperability

Defence Security

DroneShield and OpenWorks Engineering expand C2 interoperability

24 March 2026

Counter-unmanned systems (C-UxS) solutions provider, DroneShield, today announced interoperability between DroneSentry-C2 command-and-control software and optical sensing technologies from OpenWorks Engineering.

Fiona Walters takes over as Serco’s UK & Europe CEO

Defence Security Space

Fiona Walters takes over as Serco’s UK & Europe CEO

24 March 2026

Fiona Walters has taken up her role as CEO of the UK & Europe division of Serco, having joined Serco in September 2025 from G4S, where she was Regional CEO for the UK & Ireland, leading a team of more than 30,000 people.

Advertisement
ODU RT
GKN Aerospace delivers upgraded RM12 engine to Swedish Armed Forces

Defence

GKN Aerospace delivers upgraded RM12 engine to Swedish Armed Forces

24 March 2026

GKN Aerospace has successfully delivered the first upgraded RM12 engine to the Swedish Armed Forces, marking a significant milestone in the ongoing RM12EP (Enhanced Performance) programme.

FNX Ventures invests in Sentinel Photonics

Defence

FNX Ventures invests in Sentinel Photonics

24 March 2026

Sentinel Photonics, a UK defence technology company specialising in laser detection, prevention and intelligence, has secured investment from European venture capital firm, FNX Ventures.

Advertisement
PTC rectangle
Advertisement
FIA2026 animated banner