Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Defence
  • /
  • UK and allies warn of cyber attack vulnerabilities

Defence Security

UK and allies warn of cyber attack vulnerabilities

The UK and international allies issued an alert yesterday, showing an increase in cyber attackers initially exploiting previously unknown vulnerabilities to compromise enterprise networks.

Above: The National Cyber Security Centre (NCSC), Nova South, London.
Image by Simona Flamigni / copyright Shutterstock

In a new advisory, the National Cyber Security Centre (NCSC) – a part of GCHQ – alongside partners in Australia, Canada, New Zealand and the United States, shared a list of the top 15 routinely exploited vulnerabilities of 2023.

Advertisement
ODU RT

Of these vulnerabilities, the majority were first exploited as zero-days – weaknesses that were recently discovered and where a fix or patch was not immediately available from the vendor – allowing attackers to conduct cyber operations against higher-priority targets.

This trend, which the NCSC has continued to observe into 2024, marks a shift from 2022 when less than half of the top list was initially exploited as zero-day vulnerabilities.

The advisory strongly encourages enterprise network defenders to maintain vigilance with their vulnerability management processes, including applying all security updates in a timely manner and ensuring they have identified all assets in their estates.

It also calls on technology vendors and developers to follow advice on implementing secure-by-design principles into their products to help reduce the risk of vulnerabilities being introduced at source and being exploited later.

Ollie Whitehouse, NCSC Chief Technology Officer, said: “More routine initial exploitation of zero-day vulnerabilities represents the new normal which should concern end-user organisations and vendors alike as malicious actors seek to infiltrate networks.  

“To reduce the risk of compromise, it is vital all organisations stay on the front foot by applying patches promptly and insisting upon secure-by-design products in the technology marketplace.

“We urge network defenders to be vigilant with vulnerability management, have situational awareness in operations and call on product developers to make security a core component of product design and life-cycle to help stamp out this insidious game of whack-a-mole at source”.

All vulnerabilities listed have had patches and fixes made available from the vendors to help mitigate the risk of compromise.

Advertisement
ODU RT

In the case of zero-day vulnerabilities, where exploitation is rife it is vital organisations have a process in place to install vendor updates at pace after they become available to minimise the opportunity for attackers.

In addition to the top list, the advisory also details a further 32 vulnerabilities that were routinely exploited in 2023.

If mitigation steps have not already been taken, network defenders should follow vendor advice in each case and check for indicators of compromise before applying updates.

Advisory jointly published by:

  • NCSC
  • US Cybersecurity and Infrastructure Security Agency (CISA)
  • US Federal Bureau of Investigation (FBI)
  • US National Security Agency (NSA)
  • Australian Signals Directorate’s Australian Cyber Security Centre (ACSC),
  • Canadian Centre for Cyber Security (CCCS)
  • New Zealand National Cyber Security Centre (NCSC-NZ)
  • Computer Emergency Response Team New Zealand (CERT NZ)


View full advisory on CISA's website

Advertisement
FIA2026 animated banner
Vision Engineering appoints Harry Curtis as Technical Director

Aerospace Defence

Vision Engineering appoints Harry Curtis as Technical Director

17 April 2026

Woking headquartered Vision Engineering Group, provider of ergonomic microscopy and metrology solutions, has announced the appointment of Harry Curtis to the position of Technical Director, effective 1st April 2026.

Drone swarms central to AWE26

Defence Events

Drone swarms central to AWE26

17 April 2026

Drones have been at the centre of this year's Army Warfighting Experiment 2026, which each year brings together soldiers, scientists, industry and universities, to test new military technology.

Dstl assesses robotic systems in hazardous incident recovery trial

Defence

Dstl assesses robotic systems in hazardous incident recovery trial

17 April 2026

In a ‘real life’ scenario played out in an empty shopping unit, the Defence Science and Technology Laboratory (Dstl) has tested the ability of robotic and autonomous systems to navigate through a building and detect, sample and remediate (clean) a contaminated environment.

QinetiQ pays aerial tribute to iconic Spitfire

Defence Events

QinetiQ pays aerial tribute to iconic Spitfire

17 April 2026

The QinetiQ operated ETPS test pilot school based at MoD Boscombe Down has taken part in the historic Spitfire90 commemorative tour, as the only civilian-registered participants in the nine-day national flight schedule.

Advertisement
ODU RT
SitaWare Headquarters introduces Joint Fires and Targeting capabilities

Defence

SitaWare Headquarters introduces Joint Fires and Targeting capabilities

16 April 2026

Systematic has introduced within SitaWare Headquarters 6.22, a dedicated Targeting Application that brings the targeting process into the same C4ISR environment used for operational planning, situational awareness and mission execution.

Thales launches TopStar Smart Receiver

Defence

Thales launches TopStar Smart Receiver

16 April 2026

Thales has launched its TopStar Smart Receiver, a three-in-one ultra-compact solution providing land forces with resilient positioning, navigation and timing capabilities, while maintaining radio communications in increasingly contested electronic warfare environments.

Advertisement
ODU RT
Advertisement
Gulfstream banner