Company Details
national-protective-security-authority
21
13,417
92
npsa.gov.uk
0
NAT_1485971
In-progress

National Protective Security Authority (NPSA) Company CyberSecurity Posture
npsa.gov.ukThe National Protective Security Authority (NPSA) is part of MI5 and is the National Technical Authority for physical and personnel protective security. By making the UK more resilient to national security threats, we help to make the UK safe. We help organisations understand the range of threats they and the UK face, for example from terrorism, espionage, and state actors. Based on our world-leading research and development programme and the latest intelligence, we provide advice and guidance on what organisations can do to minimise their risk through how they operate day to day. In March 2023, NPSA absorbed the responsibilities of the Centre for the Protection of National Infrastructure (CPNI), but with a broader remit, reflecting the fact that the threats the UK faces today extend far beyond critical national infrastructure. To find out more, visit NPSA.gov.uk Please note, we do not routinely respond to comments and messages on LinkedIn. If you need to contact us, please visit the website. Disclaimer: No legitimate member of NPSA would be listed as an employee on social media, so please disregard any associations shown.
Company Details
national-protective-security-authority
21
13,417
92
npsa.gov.uk
0
NAT_1485971
In-progress
Between 700 and 749

NPSA Global Score (TPRM)XXXX

Description: **UK Parliament Confirms Cyberattacks Targeting MPs via WhatsApp and Signal** The UK government has officially acknowledged a surge in sophisticated cyberattacks targeting Members of Parliament (MPs) and government officials, with Russia identified as the primary suspect. Sir Lindsay Hoyle, Speaker of the House of Commons, recently disclosed that hackers have exploited messaging platforms like WhatsApp and Signal to conduct spear-phishing campaigns against parliamentarians. The National Cyber Security Centre (NCSC), part of the UK’s GCHQ, confirmed the attacks, revealing that threat actors impersonate customer support representatives to trick victims into compromising their accounts. MPs receive fraudulent messages claiming their WhatsApp accounts face suspension, prompting them to follow malicious instructions—leading to malware installation, account hijacking, or financial theft. This revelation follows an MI5 alert about Chinese nationals attempting to interfere in UK parliamentary processes through "Pig Butchering" investment scams, highlighting the growing sophistication of state-sponsored cyber operations. Messaging platforms, once considered secure, are now prime targets due to their widespread use and the ease of impersonation. While Meta has deployed AI-driven defenses to combat fraud, attackers continuously adapt, evading automated protections. The UK’s response—including NCSC advisories and direct warnings from Hoyle—underscores the escalating threat of digital espionage in global geopolitics. As cyberattacks evolve, the government’s ability to safeguard its digital infrastructure remains a critical challenge.


National Protective Security Authority (NPSA) has 23.46% more incidents than the average of same-industry companies with at least one recorded incident.
National Protective Security Authority (NPSA) has 29.87% more incidents than the average of all companies with at least one recorded incident.
National Protective Security Authority (NPSA) reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
NPSA cyber incidents detection timeline including parent company and subsidiaries

The National Protective Security Authority (NPSA) is part of MI5 and is the National Technical Authority for physical and personnel protective security. By making the UK more resilient to national security threats, we help to make the UK safe. We help organisations understand the range of threats they and the UK face, for example from terrorism, espionage, and state actors. Based on our world-leading research and development programme and the latest intelligence, we provide advice and guidance on what organisations can do to minimise their risk through how they operate day to day. In March 2023, NPSA absorbed the responsibilities of the Centre for the Protection of National Infrastructure (CPNI), but with a broader remit, reflecting the fact that the threats the UK faces today extend far beyond critical national infrastructure. To find out more, visit NPSA.gov.uk Please note, we do not routinely respond to comments and messages on LinkedIn. If you need to contact us, please visit the website. Disclaimer: No legitimate member of NPSA would be listed as an employee on social media, so please disregard any associations shown.


The NSW public sector includes ten departments and many agencies and organisations working together to develop policy and deliver important services such as health, education, housing, transport and infrastructure across NSW. We are over 300,000 dedicated people who share the same values - making a

Build the Missouri of tomorrow. Ensure a strong foundation today. Join a group of innovative team members focused on driving the State of Missouri forward. As public servants, our team members have the opportunity to produce work that is both lasting and important. This work serves to protect famil

OVERVIEW Framingham was incorporated as a town on June 25, 1700. Chapter 143 of the Acts of 1949 established the Town of Framingham Representative Town Government by Limited Town Meetings. The Citizens of Framingham adopted the Home Rule Charter for the City of Framingham at an election held on Ap

Maryland is on the path to becoming the best state in the nation. Referred to as “America in Miniature”, Maryland embodies the very spirit of the United States. Maryland is home to ethnic groups of every origin, just about every natural feature, and much like our country, opportunity! If you are

Tallinn is the capital of Estonia. The mission of the city organization is to make Tallinn the best place to live for the people staying here, the desired destination for people arriving here, and a good place of departure for people who start here. For this purpose, the management of Tallinn as a

The City of Toronto is committed to fostering a positive and progressive workplace culture, and strives to build a workforce that reflects the citizens it serves. We are committed to building a high performing public service, with strong and effective leaders to enable service excellence, through hi

Working for Amsterdam means working for the most beautiful city in the world. Think of its rich history, the role Amsterdam plays internationally, and events such as Sail, Gay Pride and King’s Day. Of course everybody wants to visit Amsterdam, or work or live here. As you can probably imagine, work

CDC works 24/7 keeping America safe from health, safety and security threats, both foreign and domestic. Whether diseases start at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, CDC fights it and supports communities and citizens to prevent it. CDC is

Welcome to the official LinkedIn page for the Federal Emergency Management Agency (FEMA). When disaster strikes, America looks to FEMA to support survivors and first responders in communities all across the country. This page provides career related information, job announcements and relevant updat
.png)
Secure Innovation Security Reviews offer innovative early-stage UK technology businesses expert, tailored guidance to help protect their...
HMG are pleased to announce the launch of the Secure Innovation Security Review Scheme. To support organisations to stay secure,...
Up to 500 small or medium-sized companies will potentially benefit from new Secure Innovation Security Reviews, which involve approved experts giving tailored...
Mapping of the UK's critical national infrastructure (CNI)'s resilience, led by organisations in the intelligence community, is to be advanced by the...
Calling cyber security professionals, culture specialists and leaders to drive uptake of new Cyber security culture principles.
A new SFJ Awards qualification designed in collaboration with and endorsed by the Protective Security Centre, Government Security,...
Technical security protects against an important range of threat vectors. It has been neglected by both business and government.
Guidance for researchers, university staff and funding organisations to help keep sensitive research and intellectual property secure.
In 2024, the UK National Cyber Security Centre issued over 500 notifications to UK organizations about cyber incidents – double the number...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of National Protective Security Authority (NPSA) is https://www.npsa.gov.uk.
According to Rankiteo, National Protective Security Authority (NPSA)’s AI-generated cybersecurity score is 731, reflecting their Moderate security posture.
According to Rankiteo, National Protective Security Authority (NPSA) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, National Protective Security Authority (NPSA) is not certified under SOC 2 Type 1.
According to Rankiteo, National Protective Security Authority (NPSA) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, National Protective Security Authority (NPSA) is not listed as GDPR compliant.
According to Rankiteo, National Protective Security Authority (NPSA) does not currently maintain PCI DSS compliance.
According to Rankiteo, National Protective Security Authority (NPSA) is not compliant with HIPAA regulations.
According to Rankiteo,National Protective Security Authority (NPSA) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
National Protective Security Authority (NPSA) operates primarily in the Government Administration industry.
National Protective Security Authority (NPSA) employs approximately 21 people worldwide.
National Protective Security Authority (NPSA) presently has no subsidiaries across any sectors.
National Protective Security Authority (NPSA)’s official LinkedIn profile has approximately 13,417 followers.
National Protective Security Authority (NPSA) is classified under the NAICS code 92, which corresponds to Public Administration.
No, National Protective Security Authority (NPSA) does not have a profile on Crunchbase.
Yes, National Protective Security Authority (NPSA) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/national-protective-security-authority.
As of December 12, 2025, Rankiteo reports that National Protective Security Authority (NPSA) has experienced 1 cybersecurity incidents.
National Protective Security Authority (NPSA) has an estimated 11,618 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (ncsc advisory and speaker's warning), and containment measures with advisories to mps on securing personal devices, and remediation measures with guidance on avoiding phishing scams, and communication strategy with direct letter from speaker of the house to parliamentarians..
Title: UK Parliament Members Targeted by Sophisticated Cyberattacks via WhatsApp and Signal
Description: Members of the UK Parliament have been targeted by sophisticated cyberattacks, particularly via messaging platforms such as WhatsApp and Signal. The National Cyber Security Centre (NCSC) confirmed that spear phishing attacks have been used to trick MPs and government officials into compromising their devices and accounts. Hackers posed as WhatsApp customer support representatives to deceive victims into following malicious instructions, leading to potential account drainage, malware installation, or device locking.
Type: Spear Phishing
Attack Vector: WhatsAppSignal
Vulnerability Exploited: Social Engineering / Phishing
Threat Actor: Russia (suspected state-sponsored actors)
Motivation: EspionageData Theft
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Messaging platforms (WhatsApp and Signal).

Data Compromised: Potential access to sensitive parliamentary and personal data
Systems Affected: Personal devices of MPs and government officialsMessaging platforms (WhatsApp, Signal)
Operational Impact: Compromised communication channels for MPs and officials
Brand Reputation Impact: Damage to trust in parliamentary digital security
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data, Parliamentary Communications and .

Entity Name: UK Parliament
Entity Type: Government
Industry: Public Sector / Government
Location: United Kingdom
Size: Large (Members of Parliament and officials)
Customers Affected: MPs and government officials

Incident Response Plan Activated: Yes (NCSC advisory and Speaker's warning)
Containment Measures: Advisories to MPs on securing personal devices
Remediation Measures: Guidance on avoiding phishing scams
Communication Strategy: Direct letter from Speaker of the House to parliamentarians
Incident Response Plan: The company's incident response plan is described as Yes (NCSC advisory and Speaker's warning).

Type of Data Compromised: Personal data, Parliamentary communications
Sensitivity of Data: High (government and personal sensitive information)
Personally Identifiable Information: Likely
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Guidance on avoiding phishing scams.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by advisories to mps on securing personal devices.

Lessons Learned: Messaging platforms like WhatsApp and Signal are increasingly exploited for cyberattacks, requiring heightened vigilance and security measures for high-profile targets. State-sponsored actors continue to evolve their tactics, necessitating adaptive cybersecurity strategies.

Recommendations: Enhanced cybersecurity training for MPs and government officials, Implementation of multi-factor authentication (MFA) for messaging platforms, Regular security audits of personal and official devices, Collaboration with messaging platform providers (e.g., Meta) to improve fraud detection, Public awareness campaigns on recognizing phishing attemptsEnhanced cybersecurity training for MPs and government officials, Implementation of multi-factor authentication (MFA) for messaging platforms, Regular security audits of personal and official devices, Collaboration with messaging platform providers (e.g., Meta) to improve fraud detection, Public awareness campaigns on recognizing phishing attemptsEnhanced cybersecurity training for MPs and government officials, Implementation of multi-factor authentication (MFA) for messaging platforms, Regular security audits of personal and official devices, Collaboration with messaging platform providers (e.g., Meta) to improve fraud detection, Public awareness campaigns on recognizing phishing attemptsEnhanced cybersecurity training for MPs and government officials, Implementation of multi-factor authentication (MFA) for messaging platforms, Regular security audits of personal and official devices, Collaboration with messaging platform providers (e.g., Meta) to improve fraud detection, Public awareness campaigns on recognizing phishing attemptsEnhanced cybersecurity training for MPs and government officials, Implementation of multi-factor authentication (MFA) for messaging platforms, Regular security audits of personal and official devices, Collaboration with messaging platform providers (e.g., Meta) to improve fraud detection, Public awareness campaigns on recognizing phishing attempts
Key Lessons Learned: The key lessons learned from past incidents are Messaging platforms like WhatsApp and Signal are increasingly exploited for cyberattacks, requiring heightened vigilance and security measures for high-profile targets. State-sponsored actors continue to evolve their tactics, necessitating adaptive cybersecurity strategies.

Source: National Cyber Security Centre (NCSC)

Source: Speaker of the House of Commons (Sir Lindsay Hoyle)

Source: MI5 Intelligence Alert
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: National Cyber Security Centre (NCSC), and Source: Speaker of the House of Commons (Sir Lindsay Hoyle), and Source: MI5 Intelligence Alert.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Direct letter from Speaker of the House to parliamentarians.

Stakeholder Advisories: NCSC and Speaker of the House have issued warnings to MPs and officials.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was NCSC and Speaker of the House have issued warnings to MPs and officials..

Entry Point: Messaging platforms (WhatsApp, Signal)
High Value Targets: MPs and government officials
Data Sold on Dark Web: MPs and government officials

Root Causes: Lack Of Awareness Of Phishing Tactics Among High-Profile Targets, Exploitation Of Trusted Messaging Platforms, Sophisticated Social Engineering Techniques,
Corrective Actions: Strengthening Cybersecurity Protocols For Government Officials, Improving Detection And Blocking Of Fraudulent Activities On Messaging Platforms,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Strengthening Cybersecurity Protocols For Government Officials, Improving Detection And Blocking Of Fraudulent Activities On Messaging Platforms, .
Last Attacking Group: The attacking group in the last incident was an Russia (suspected state-sponsored actors).
Most Significant Data Compromised: The most significant data compromised in an incident was Potential access to sensitive parliamentary and personal data.
Most Significant System Affected: The most significant system affected in an incident were Personal devices of MPs and government officialsMessaging platforms (WhatsApp, Signal).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Advisories to MPs on securing personal devices.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Potential access to sensitive parliamentary and personal data.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Messaging platforms like WhatsApp and Signal are increasingly exploited for cyberattacks, requiring heightened vigilance and security measures for high-profile targets. State-sponsored actors continue to evolve their tactics, necessitating adaptive cybersecurity strategies.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implementation of multi-factor authentication (MFA) for messaging platforms, Collaboration with messaging platform providers (e.g., Meta) to improve fraud detection, Regular security audits of personal and official devices, Public awareness campaigns on recognizing phishing attempts and Enhanced cybersecurity training for MPs and government officials.
Most Recent Source: The most recent source of information about an incident are Speaker of the House of Commons (Sir Lindsay Hoyle), MI5 Intelligence Alert and National Cyber Security Centre (NCSC).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was NCSC and Speaker of the House have issued warnings to MPs and officials., .
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Messaging platforms (WhatsApp and Signal).
.png)
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.
MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.