Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Double-Edged Sustainability Sword Of AI In Web Design

      August 20, 2025

      Top 12 Reasons Enterprises Choose Node.js Development Services for Scalable Growth

      August 20, 2025

      GitHub’s coding agent can now be launched from anywhere on platform using new Agents panel

      August 20, 2025

      Stop writing tests: Automate fully with Generative AI

      August 19, 2025

      I’m a diehard Pixel fan, but I’m not upgrading to the Pixel 10. Here’s why

      August 21, 2025

      Google Pixel Watch 4 vs. Samsung Galaxy Watch 8: I compared the two best Androids, and here’s the winner

      August 21, 2025

      Get a free Amazon gift card up to $300 when you preorder a new Google Pixel 10 phone – here’s how

      August 21, 2025

      Everything announced at Made by Google 2025: Pixel 10 Pro, Fold, Watch 4, and more

      August 21, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Copy Errors as Markdown to Share With AI in Laravel 12.25

      August 21, 2025
      Recent

      Copy Errors as Markdown to Share With AI in Laravel 12.25

      August 21, 2025

      Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

      August 20, 2025

      Susan Etlinger, AI Analyst and Industry Watcher on Building Trust

      August 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      TerraMaster D1 SSD Plus Review: Experience a Faster External SSD

      August 20, 2025
      Recent

      TerraMaster D1 SSD Plus Review: Experience a Faster External SSD

      August 20, 2025

      Microsoft is investigating Windows 11 KB5063878 SSD data corruption/failure issue

      August 20, 2025

      Microsoft Surface Won’t Turn On: 6 Tested Solutions to Fix

      August 20, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»NHS Charter Urges Vendors to Improve Cybersecurity to Prevent Ransomware

    NHS Charter Urges Vendors to Improve Cybersecurity to Prevent Ransomware

    May 19, 2025

    NHS charter cybersecurity pledge

    The UK’s National Health Service (NHS) is asking its IT suppliers to commit to better cybersecurity by signing a public charter.

    In a May 15 open letter to suppliers, top UK and NHS cyber officials urged suppliers to sign the NHS charter and pledge to adopt cybersecurity best practices that could help address a wave of crippling ransomware attacks that have hit NHS hospitals and healthcare facilities.

    A self-assessment form will be launched in the fall allowing suppliers to sign the NHS charter. That gives them several months to adopt the eight practices outlined in the open letter.

    NHS Charter Outlines 8 Cybersecurity Practices

    The eight cybersecurity practices outlined in the letter include:

    • Keeping systems up to date with the latest patches for known vulnerabilities;
    • Achieving and maintaining at least “Standards Met” as part of the Data Security and Protection Toolkit (DSPT);
    • Applying Multi-Factor Authentication (MFA) to networks and systems and supporting identity federation or MFA functionality on products;
    • Deploying effective around-the-clock cyber monitoring and logging of critical IT infrastructure;
    • Implementing immutable backups of critical business data and products, with tested business continuity and rapid recovery plans;
    • Board-level exercises “to ensure you are confident of your ability to respond in the event of a cyber attack”;
    • Reporting to clients in a timely manner, adhering to all regulatory requirements, and working collaboratively with NHS England in the event of a cyberattack affecting patient care or data;
    • Producing any software for NHS in adherence to the Department for Science, Innovation and Technology (DSIT)/National Cyber Security Centre (NCSC) software code of practice and committing to meeting the principles of secure design and development, secure build environment, secure deployment and maintenance and communication with customers.

    NHS Pledge Is Voluntary – And Doesn’t Change Legal Requirements

    While the NHS charter pledge is voluntary, the letter notes that organizations “will also have legal obligations to maintain the cyber security of the processes and systems you operate under arrangements with NHS organisations.”

    That includes contractual terms and other obligations such as Article 32 of UK GDPR requirements for appropriate technical and organizational measures appropriate to the risks to personal data. And DSPT requirements “remain whether or not you sign-up to the cyber security charter.”

    The letter – from Phil Huggins, National Chief Information Security Officer for Health and Care at the Department of Health and Social Care; Mike Fell, NHS England Director of Cyber Operations; and Vin Diwakar, National Director of Transformation for NHS England – noted that additional steps are also under development that include:

    • Developing tools that providers can use to identify their critical suppliers to carry out appropriate assurance;
    • Defining requirements for a national supplier management platform to map the supply chain and develop a risk assurance model “allowing us to identify and mitigate concentration risk”;
    • And reviewing the contractual frameworks that NHS organizations use to enter contracts so they have appropriate security schedules and clear expectations, which is part of a cross-government initiative.

    The letter also referred to the planned Cyber Security and Resilience Bill that is under development and aimed at protecting critical infrastructure. The bill is expected to be introduced to Parliament later this year.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuild an AI-powered text-to-SQL chatbot using Amazon Bedrock, Amazon MemoryDB, and Amazon RDS
    Next Article More Than 100 Groups and Individuals Oppose GDPR Changes

    Related Posts

    Development

    Copy Errors as Markdown to Share With AI in Laravel 12.25

    August 21, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 21, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Microsoft Edge Launches Copilot Mode to Redefine Web Browsing for the AI Era

    Machine Learning

    CVE-2025-47113 – Adobe Experience Manager Stored Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    Community News: Latest PECL Releases (06.24.2025)

    Development

    CVE-2025-5051 – FreeFloat FTP Server Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2023-53142 – “Ice: Buffer Overflow in ice_get_module_eeprom()”

    May 2, 2025

    CVE ID : CVE-2023-53142

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ice: copy last block omitted in ice_get_module_eeprom()

    ice_get_module_eeprom() is broken since commit e9c9692c8a81 (“ice:
    Reimplement module reads used by ethtool”) In this refactor,
    ice_get_module_eeprom() reads the eeprom in blocks of size 8.
    But the condition that should protect the buffer overflow
    ignores the last block. The last block always contains zeros.

    Bug uncovered by ethtool upstream commit 9538f384b535
    (“netlink: eeprom: Defer page requests to individual parsers”)
    After this commit, ethtool reads a block with length = 1;
    to read the SFF-8024 identifier value.

    unpatched driver:
    $ ethtool -m enp65s0f0np0 offset 0x90 length 8
    Offset Values
    —— ——
    0x0090: 00 00 00 00 00 00 00 00
    $ ethtool -m enp65s0f0np0 offset 0x90 length 12
    Offset Values
    —— ——
    0x0090: 00 00 01 a0 4d 65 6c 6c 00 00 00 00
    $

    $ ethtool -m enp65s0f0np0
    Offset Values
    —— ——
    0x0000: 11 06 06 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 01 08 00
    0x0070: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    patched driver:
    $ ethtool -m enp65s0f0np0 offset 0x90 length 8
    Offset Values
    —— ——
    0x0090: 00 00 01 a0 4d 65 6c 6c
    $ ethtool -m enp65s0f0np0 offset 0x90 length 12
    Offset Values
    —— ——
    0x0090: 00 00 01 a0 4d 65 6c 6c 61 6e 6f 78
    $ ethtool -m enp65s0f0np0
    Identifier : 0x11 (QSFP28)
    Extended identifier : 0x00
    Extended identifier description : 1.5W max. Power consumption
    Extended identifier description : No CDR in TX, No CDR in RX
    Extended identifier description : High Power Class (> 3.5 W) not enabled
    Connector : 0x23 (No separable connector)
    Transceiver codes : 0x88 0x00 0x00 0x00 0x00 0x00 0x00 0x00
    Transceiver type : 40G Ethernet: 40G Base-CR4
    Transceiver type : 25G Ethernet: 25G Base-CR CA-N
    Encoding : 0x05 (64B/66B)
    BR, Nominal : 25500Mbps
    Rate identifier : 0x00
    Length (SMF,km) : 0km
    Length (OM3 50um) : 0m
    Length (OM2 50um) : 0m
    Length (OM1 62.5um) : 0m
    Length (Copper or Active cable) : 1m
    Transmitter technology : 0xa0 (Copper cable unequalized)
    Attenuation at 2.5GHz : 4db
    Attenuation at 5.0GHz : 5db
    Attenuation at 7.0GHz : 7db
    Attenuation at 12.9GHz : 10db
    ……..
    ….

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    How to turn off Gemini in your Gmail, Docs, Photos, and more – it’s easy to opt out

    July 16, 2025

    8 Best Password Managers with 2FA Support (Free & Paid)

    August 14, 2025

    CVE-2025-4095 – Docker Desktop MacOS Registry Access Bypass Vulnerability

    April 29, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.