NCSC launches SilentGlass, a plug-in device to secure HDMI and DisplayPort links
NCSC’s SilentGlass blocks malicious HDMI/DisplayPort links, protecting monitors from hardware attacks. Now commercialized for global use. The UK’s National Cyber Security Centre (NCSC) has launched SilentGlass, a new device to protect one of the most overlooked parts of modern IT systems: the physical links between screens and computers. It is a small plug-in security device […]

The UK’s National Cyber Security Centre (NCSC) has launched SilentGlass, a new device to protect one of the most overlooked parts of modern IT systems: the physical links between screens and computers. It is a small plug-in security device designed to monitor and block suspicious activity on HDMI and DisplayPort connections.
Developed through research led by the NCSC and now licensed for production to Goldilock Labs in partnership with Sony UK Technology Centre, SilentGlass represents a shift in how hardware interfaces are treated in cybersecurity. Instead of focusing only on software threats, it addresses risks that arise when physical connections themselves are exploited.
Related breach coverage
- World-first NCSC-engineered device secures vulnerable display links2026-04-22
SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections.
- U.S. utility giant Itron discloses a security breach2026-04-27
Itron detected unauthorized access to part of its IT environment on April 13, 2026, and launched incident response and notified authorities. Itron disclosed a cyber incident involving unauthorized access to part of its internal IT systems, detected on April 13, 2026. The company activated its incident response plan, engaged external cybersecurity experts, and notified law […]
- Fast16: Pre-Stuxnet malware that targeted precision engineering software2026-04-27
Fast16 is a pre-Stuxnet malware that tampered with precision software and spread itself. Evidence suggests links to U.S. operations during early cyber tensions. SentinelOne uncovered Fast16, a sabotage malware used in 2005, years before Stuxnet. The malicious code is written in Lua and targeted high-precision calculation software, altering results and spreading across systems. The malware […]
- CISA orders feds to patch Windows flaw exploited as zero-day2026-04-29
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability exploited in zero-day attacks. [...]
