Skip to content
Latest posts

It’s official – Ditch the password – time to start using passkeys

Microsoft finally update RDP connections

NCA 2026 National Strategic Assessment of Serious Organised Crime

DualStrike – Real-time attacks against commodity keyboards

Is it time to replace BGP? SCION thinks so

KadNap Botnet compromises 14K+ devices worldwide

Cybertrainer.uk
Cybertrainer.uk

Helping build cyber security awareness

  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
Menu
  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
  • Pillar 1 – Ransomware & cybercrime
  • Pillar 2 – Malware & cyber attacks explained
  • Pillar 3 – Enterprise & Technical Security
  • Pillar 4 – Critical Infrastructure & Real-World attacks
  • Pillar 5 – Human factors, AI & Cyber Awareness
Wednesday, April 29, 2026
  • 365 days of blogs
  • August

(21/08/23) Blog 233 – Thai cyber police seize ฿1.5 Billion

A series of raids across Thailand by the Thai cyber police has led to a number of arrests, the dismantling of a fraudulent call centre, the closure of a scam crypto fund, and the seizure of a large ha...

Mark
21/08/2023
Read More
  • 365 days of blogs
  • August

(20/08/23) Blog 232 – Anonfiles closes, hackers lose data

Anonfiles – the notorious file upload site used worldwide by regular users and hackers alike has closed. The site owners / administrators closed the site last week citing an an endless stream of...

Mark
20/08/2023
Read More
  • 365 days of blogs
  • August

(19/08/23) Blog 231 – Africa Cyber Surge II – Return of Interpol

A four-month long operation involving international law enforcement officers led by Interpol has led to the arrest of 14 suspected cyber criminals across 25 African nations, including: The operation w...

Mark
19/08/2023
Read More
  • 365 days of blogs
  • August

(18/08/23) Blog 230 – QR codes used in phishing attack to bypass email security scanners

A novel approach to phishing has surfaced in a large-scale attack on a major US energy supplier. The attack begins with a phishing email that claims the recipient must take action to update their Micr...

Mark
18/08/2023
Read More
  • 365 days of blogs
  • August

(17/08/23) Blog 229 – 1,000’s of Citrix Netscaler servers hacked

Security researchers at Fox-IT, working in conjunction with the Dutch Institute of Vulnerability Disclosure (DIVD) have released an advisory this week which details a global hack of almost 2,000 Citri...

Mark
17/08/2023
Read More
  • 365 days of blogs
  • August

(16/08/23) Blog 228 – Arion Kurtaj faces court proceedings

Back in July, I posted the story of the teenage hacker who was responsible for the attacks on Rockstar games, Uber, and revolut. At that time, the news was that Southwark crown court had lifted report...

Mark
16/08/2023
Read More
  • 365 days of blogs
  • August

(15/08/23) Blog 227 – Welcome Veilid – the new, open-source app framework from one of the original hacking groups

Last Friday (11/08/23) a new framework for application developers was announced at DEFCON which aims to provide developers the ability to build distributed, private applications free from the commerci...

Mark
15/08/2023
Read More
  • 365 days of blogs
  • August

(14/08/23) Blog 226 – The future of (no) passwords

For many people, juggling multiple passwords becomes not only a chore, but also a systematic failure in the protection of accounts and services. We all know the principles of good password hygiene*, i...

Mark
14/08/2023
Read More
  • 365 days of blogs
  • August

(13/08/23) Blog 225 – Checkmate – Knight ransomware posing as TripAdvisor complaint

A Security researcher at Sophos has discovered a ransomware campaign which attempts to infiltrate a victims devices posing as a TripAdvisor complaint. The researcher – @felixw3000 posted on the ...

Mark
13/08/2023
Read More
  • 365 days of blogs
  • August

(12/08/23) Blog 224 – Ford discloses software vulnerability in the SYNC3 infotainment system

Yesterday I posted news about how security researchers have managed to compromise a Tesla allowing them to enable previously locked features. Today, I write about a vulnerability which has been discov...

Mark
12/08/2023
Read More
1234
Copyright © 2026 Cybertrainer.uk | Powered by News Magazine X