Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide

Defence Security

NCSC Annual Review launched

The National Cyber Security Centre (NCSC) launched its eighth Annual Review at its London headquarters last week, highlighting growing threats, including from state actors.

Image courtesy NCSC

In the Annual Review, the NCSC highlights the increasingly challenging online environment that the UK and its allies are navigating to ensure a safe and prosperous digital world for its citizens.

In his first major speech, Richard Horne (above), CEO of the NCSC since October 2024, emphasised the need for sustained vigilance in an increasingly aggressive online world.: “What has struck me more forcefully than anything else since taking the helm at the NCSC is the clearly widening gap between the exposure and threat we face, and the defences that are in place to protect us.

Advertisement
Security & Policing Rectangle

“And what is equally clear to me is that we all need to increase the pace we are working at to keep ahead of our adversaries.

“The NCSC, as the National Technical Authority, has been publishing advice, guidance and frameworks since our inception, in a bid to drive up the cyber security of the UK. The reality is that advice, that guidance, those frameworks need to be put into practice much more across the board.

“We need all organisations, public and private, to see cyber security as both an essential foundation for their operations and a driver for growth. To view cyber security not just as a ‘necessary evil’ or compliance function but as a business investment, a catalyst for innovation and an integral part of achieving their purpose.

“Hostile activity in UK cyberspace has increased in frequency, sophistication and intensity. We see this in the intelligence we can access through being part of GCHQ. Actors are increasingly using our technology dependence against us, seeking to cause maximum disruption and destruction.

“Last week, the Chancellor of the Duchy of Lancaster warned about the aggression and recklessness of cyber activity we see coming from Russia. And with our partners, including at the NPSA, we can see how cyber attacks are increasingly important to Russian actors, along with sabotage threats to physical security, which the director general of MI5 spoke about recently.

“All the while, China remains a highly sophisticated cyber actor, with increasing ambition to project its influence beyond its borders.

“And yet, despite all this, we believe the severity of the risk facing the UK is being widely underestimated.

“There is no room for complacency about the severity of state-led threats or the volume of the threat posed by cyber criminals. The defence and resilience of critical infrastructure, supply chains, the public sector and our wider economy must improve.

“In the past year, we have seen crippling attacks against institutions that have brought home the true price tag of cyber incidents. The attack against Synnovis showed us how dependent we are on technology for accessing our health services. And the attack against the British Library reminded us that we’re reliant on technology for our access to knowledge.

“What these and other incidents show is how entwined technology is with our lives and that cyber attacks have human costs.” 

On the launch of the NCSC’s Annual Review, Chancellor of the Duchy of Lancaster Pat McFadden said: “As a nation, we must harness technology to drive growth and opportunity, without leaving ourselves vulnerable to the ever-growing threat from malicious cyber actors.

“The NCSC is at the centre of the Government's efforts to strengthen the cyber resilience of organisations and individuals.

“We must work alongside industry to meet the increasingly sophisticated challenges we face and make the UK the safest place to live and work online.”

Advertisement
PTC rectangle

State threat
Characterising the 2024 cyber threat landscape as “diffuse and dangerous”, the NCSC Annual Review notes a rising frequency of cyber incidents and a growing severity in their impact.

Over the past 12 months, the NCSC has observed how conflicts are fuelling a volatile threat landscape, including Russia’s deployment of destructive malware against Ukrainian targets, and routine attempts to interfere with the systems of NATO countries in support of its war effort.

China is described as a highly sophisticated and capable actor targeting a wide range of sectors. In February 2024, the NCSC co-signed an advisory on observed compromises of US Critical National Infrastructure (CNI) by Volt Typhoon and in March 2024 the UK government called out China state-affiliated actors for targeting democratic institutions.

Iran-based threat actors remain aggressive in cyberspace and the Democratic People’s Republic of Korea (DPRK) continues to prioritise raising revenue to circumvent sanctions and collect intelligence in its cyber activity.

Criminal threat
Ransomware is highlighted as the most pervasive cyber threat to UK organisations, highlighting the financially motivated ransomware attack on Synnovis, a supplier to the NHS, which had a significant impact on citizens.

Elsewhere, cyber criminals’ use artificial intelligence (AI) to increase the volume and heighten the impact of cyber attacks. In January 2024, the NCSC published an assessment of the near-term impact of AI on the cyber threat, highlighting how it can be used for reconnaissance, social engineering and analysis of exfiltrated data.

The Annual Review also notes an observation from the NCSC that the application of AI to cyber defence will exceed the uplift in any adversary capability or application.

Incidents
This year, the NCSC’s Incident Management team handled 430 incidents, compared to 371 the previous year. Of these, 347 involved some level of data exfiltration and 20 incidents involved ransomware.

The top sectors reporting ransomware activity into the NCSC this year were academia, manufacturing, IT, legal, charities and construction.

Elsewhere, the Incident Management team issued 542 bespoke notifications informing organisations to a cyber incident impacting them and provided advice and guidance on how to mitigate it. This was more than double the 258 bespoke notifications issued last year.

Almost half of the bespoke notifications sent this year related to pre-ransomware activity, enabling organisations to detect and remove precursor malware before ransomware was deployed.

NCSC Annual Review 2024
Take a look at the NCSC's Annual Review 2024, showcasing key developments and highlights between 1st September 2023 and 31st August 2024.

Advertisement
Babcock LB Babcock LB
BAE Systems receives US Marine Corps ACVs contract

Defence

BAE Systems receives US Marine Corps ACVs contract

4 February 2026

BAE Systems has received a $195 million for the production of additional Amphibious Combat Vehicles (ACVs) for the US Marine Corps.

UK-Japan partnerships advance quantum and future connectivity tech

Aerospace Defence Security Space

UK-Japan partnerships advance quantum and future connectivity tech

4 February 2026

Joint investments will advance quantum technology, boost digital connectivity and strengthen network resilience against cyber threats.

Blighter boosts stealth of e-scan radars

Defence Security

Blighter boosts stealth of e-scan radars

4 February 2026

Blighter Surveillance Systems has further boosted the stealth characteristics of its e-scan radars to better serve the growing number of developers of crewed and autonomous multisensor surveillance vehicles and platforms.

Ultra Maritime secures £40m MoD sonobuoys contract

Defence

Ultra Maritime secures £40m MoD sonobuoys contract

3 February 2026

Ultra Maritime has secured a £40 million contract from the UK Ministry of Defence (MoD) to deliver sonobuoys for the Royal Navy’s Merlin Maritime Patrol Helicopter - significantly strengthening the UK’s undersea surveillance and deterrence posture at a time when British waters are under increasing threat from foreign actors.

Advertisement
ODU RT
Babcock and ASELSAN partner on training simulation

Defence

Babcock and ASELSAN partner on training simulation

3 February 2026

Babcock has signed a Memorandum of Understanding (MoU) with ASELSAN, to explore the Royal Air Force’s (RAF) requirement for a Surface Electronic Warfare Threat (SEWT) training system as part of the Next Generation Operational Training (NGOT) programme.

Defence personnel to gain greater powers to defeat drones

Defence Security

Defence personnel to gain greater powers to defeat drones

3 February 2026

The security of key military sites will be strengthened as Defence personnel will be given stronger powers to defeat drones near bases as part of new measures being introduced in the Armed Forces Bill.

Advertisement
ODU RT
Advertisement
ECS leaderboard banner