Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Gainsight Cyber-Attack Affect More Salesforce Customers

November 27, 2025

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages

November 27, 2025

UK Report Proposes Liability For Software Provider Insecurity

November 26, 2025
Facebook X (Twitter) Instagram
Thursday, November 27
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»UK Report Proposes Liability For Software Provider Insecurity
News

UK Report Proposes Liability For Software Provider Insecurity

Team-CWDBy Team-CWDNovember 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A renewed push to make software providers legally responsible for insecure products has been set out in a new report from the UK’s Business and Trade Committee.

The document argues that frequent and costly cyber-attacks across major sectors show that voluntary measures are no longer enough to protect the economic stability of the UK.

Rising Public Costs From Insecure Software

A series of incidents in 2025, including attacks on Co-op, M&S and Jaguar Land Rover (JLR), underscored the financial and operational fallout from cyber-intrusions. M&S reported losses of £300m, while the Co-op shifted parts of its funeral operations to manual processes after its systems were disrupted. 

The report notes that although the UK’s National Cyber Security Centre (NCSC) promotes a “secure by design” model, developers face no penalties if they release products containing exploitable flaws.

The Committee warns that this gap leaves the public sector and consumers exposed to escalating risks. It also highlights that providers can sell software with insecure features without bearing the cost if attacks exploit those weaknesses.

A core recommendation is that the Government introduce legislation requiring companies to follow the principles outlined in its Software Security Code of Practice. The current code is voluntary, monitored only through self-assessment and designed to encourage, rather than compel, secure development practices.

The report cites international moves as evidence that stronger action is possible. The EU’s Cyber Resilience Act, which enters full effect in 2027, is framed as a shift toward liability, empowering regulators to order product recalls and impose fines for non-compliance.

Why Liability Matters

The Committee argues that the UK’s economic security cannot be sustained without reducing the volume of insecure products entering the market. It sets out three areas of focus:

  • Making software developers liable for avoidable vulnerabilities

  • Incentivizing greater investment in cyber-resilience

  • Introducing mandatory reporting of cyber incidents to build a clearer national threat picture

Read more on cyber-resilience: UK Government Finally Introduces Cyber Security and Resilience Bill

By shifting responsibility to vendors, the proposed reforms aim to counter a trend in which the public absorbs the costs of private sector security failures.

“As a cybersecurity industry, we need to re-evaluate how we measure security and vendors, looking deeper into trends and categorization, i.e., vendors with recurring vulnerabilities in critical components, such as those found in edge-facing infrastructure,” commented Simon Phillips, CTO of Engineering at CybaVerse.

“Why should the burden and the associated costs of incidents always be the responsibility of victims? To really drive defenses, we have to look beyond the surface, beyond the ransomware payments and into what is really enabling cybercrime to flourish.”

The Committee concluded that compliance with secure-by-design principles should represent the baseline standard rather than a discretionary choice. It urged ministers to give enforcement bodies the power to monitor adherence and issue penalties where firms fall short.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet
Next Article Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Team-CWD
  • Website

Related Posts

News

Gainsight Cyber-Attack Affect More Salesforce Customers

November 27, 2025
News

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages

November 27, 2025
News

Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet

November 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.