Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

December 13, 2025

5 Threats That Reshaped Web Security This Year [2025]

December 13, 2025

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

December 13, 2025
Facebook X (Twitter) Instagram
Sunday, December 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCSC Plugs Gap in Cyber Deception Guidance
News

NCSC Plugs Gap in Cyber Deception Guidance

Team-CWDBy Team-CWDDecember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cyber deception can be a great way to detect novel threats and uncover hidden compromises, but organizations face several barriers and risks associated with programs, the National Cyber Security Centre (NCSC) has warned.

The NCSC yesterday shared its learnings from a pilot project it’s running under the Active Cyber Defence (ACD) 2.0 program, featuring 121 UK organizations and 14 cyber-deception solution providers.

It highlighted five findings:

  • Outcome-based metrics are not always easy to generate and require development. Data and context are crucial to delivering insight rather than noise
  • Terminology is often inconsistent across the cyber-deception industry, making it difficult for organizations to understand what vendors are offering
  • A guidance gap means impartial advice, real-world case studies, and reassurance that tools are effective and safe are often missing. Although there’s a strong marketplace of providers, it can be difficult for beginners to navigate
  • If tools aren’t properly configured, there’s a risk that they may fail to detect threats, create a false sense of security, and even let threat actors sneak into networks. Constant fine-tuning and regular updates are necessary
  • Most (90%) organizations prefer not to advertise that they’re using cyber-deception tools and techniques. However, there is evidence to suggest that when threat actors know a company is running honeypots, they become less confident in their efforts, which can benefit network defenders

Read more on cyber deception: NCSC Calls on UK Firms to Join Mass Cyber-Deception Initiative.

The NCSC’s goal with this pilot is to “establish an evidence base for use cases” of cyber deception at a national scale, to see how the technology might be adopted as part of Active Cyber Defence 2.0.

The plan is to deploy a minimum of 5000 low- and high-interaction solutions on the UK internet, across IPv4 and IPv6, plus 20,000 low-interaction solutions inside internal networks. The NCSC also wants to deploy 200,000 low-interaction solutions in cloud environments and two million honeytokens – fake IT resources designed to detect criminal activity.

Imposing Costs on the Enemy

The NCSC said it will continue its efforts to raise awareness and understanding of cyber deception, so that organizations can choose the right products and learn from peers.

It also hopes to impart the knowledge that cyber deception can improve national resilience by imposing costs on adversaries.

“By forcing attackers to spend time and resources navigating false environments, chasing fake credentials, or second-guessing their access, cyber deception can slow down attacks and increase the likelihood of detection. This aligns with broader national resilience goals by making the UK a harder, more expensive target,” the NCSC wrote.

“Cyber deception isn’t new, but neither is it widely used, and that’s a missed opportunity. When done well, it can provide early warning of attacks, generate high-quality intelligence, and shape how our adversaries operate. But it’s not a magic fix; it requires planning, strategy, and support.”

The NCSC said it’s providing this support, so that more UK organizations can harness the power of deception, alongside observability and threat hunting, to detect, understand and respond to threats more effectively.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTurning Disruptive Technology into a Strategic Advantage
Next Article WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
Team-CWD
  • Website

Related Posts

News

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

December 13, 2025
News

5 Threats That Reshaped Web Security This Year [2025]

December 13, 2025
News

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

December 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.