Skip to content
Latest posts

It’s official – Ditch the password – time to start using passkeys

Microsoft finally update RDP connections

NCA 2026 National Strategic Assessment of Serious Organised Crime

DualStrike – Real-time attacks against commodity keyboards

Is it time to replace BGP? SCION thinks so

KadNap Botnet compromises 14K+ devices worldwide

Cybertrainer.uk
Cybertrainer.uk

Helping build cyber security awareness

  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
Menu
  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
  • Pillar 1 – Ransomware & cybercrime
  • Pillar 2 – Malware & cyber attacks explained
  • Pillar 3 – Enterprise & Technical Security
  • Pillar 4 – Critical Infrastructure & Real-World attacks
  • Pillar 5 – Human factors, AI & Cyber Awareness
Wednesday, April 29, 2026
  • 365 days of blogs
  • February

(28-02-23) Blog 59 – Good guy turned bad

Dutch police have released a statement saying that they have arrested three men for their alleged involvement with a ransomware gang that stole sensitive data and extorted hundreds of thousands of eur...

mark
28/02/2023
Read More
  • 365 days of blogs
  • February

(27-02-23) Blog 58 – Lazarus group – an Exposé

You may or may not have heard of the North Korean hacking group known as Lazarus Group. If you haven’t – you will most certainly have heard of some of their activities: Sony Hack? WannaCry...

mark
27/02/2023
Read More
  • 365 days of blogs
  • February

(26-02-23) Blog 57 – Gmailc2 – An undetectable c2 server

A new RAT (Remote Access Trojan) has come on the scene which communicates via SMTP – The Simple Message Transfer Protocol to avoid detection by security tools. SMTP is vital in any network if yo...

Mark
26/02/2023
Read More
  • 365 days of blogs
  • February

(25-02-23) Blog 56 – Your voice is your password vulnerability

In the past few years, a new, alternative to traditional passwords has started to be implemented by many services we use – most widely in banking. Rather than have to go through multiple securit...

Mark
25/02/2023
Read More
  • 365 days of blogs
  • February

(24-02-23) Blog 55 – MyloBot – 50K devices infected daily

US-based Cyber Security company BitSight have recently released a report about a botnet which is increasing its capability by over 50,000 newly infected devices every day. MyloBot has compromised thou...

Mark
24/02/2023
Read More
  • 365 days of blogs
  • February

(23-02-23) Blog 54 – LockBit back again

The LockBit criminal gang has continued with its ransomware efforts with an attack on the water utility company of Portugal’s second-largest city – Porto. Águas e Energia do Porto said on Februa...

Mark
23/02/2023
Read More
  • 365 days of blogs
  • February

(22-02-23) Blog 53 – KillNet – Pro-Russian hackers causing chaos across the globe

At the beginning of October last year, a number of websites under the control of the German government, including those of the office of the German Chancellor – Olaf Scholz, the German military,...

Mark
22/02/2023
Read More
  • 365 days of blogs
  • February

(21-02-23) Blog 52 – CB3ROB – The ex-NATO nuclear bunker at the heart of the dark web & organised crime

At the beginning of February, an encrypted messaging service that had been under investigation since 2019 was been shut down after a sweeping series of raids across Europe. In a search of 79 propertie...

Mark
21/02/2023
Read More
  • 365 days of blogs
  • February

(20-02-23) Blog 51 – Record breaking HTTP DDoS attack seen

On Monday the 13th February, web infrastructure company Cloudflare disclosed that it had stopped a record-breaking DDoS (Distributed Denial-of-Service) attack that peaked at over 71 million requests p...

Mark
20/02/2023
Read More
  • 365 days of blogs
  • February

(19-02-23) Blog 50 – RCE – What is it? and why is it dangerous?

If you’ve been following my blogs, you may have noticed that in a few of them, I mention that a particular threat actor, or malware is capable of RCE, and that it’s a hackers wet dream to ...

Mark
19/02/2023
Read More
123
Copyright © 2026 Cybertrainer.uk | Powered by News Magazine X