Skip to content
Latest posts

It’s official – Ditch the password – time to start using passkeys

Microsoft finally update RDP connections

NCA 2026 National Strategic Assessment of Serious Organised Crime

DualStrike – Real-time attacks against commodity keyboards

Is it time to replace BGP? SCION thinks so

KadNap Botnet compromises 14K+ devices worldwide

Cybertrainer.uk
Cybertrainer.uk

Helping build cyber security awareness

  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
Menu
  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
  • Pillar 1 – Ransomware & cybercrime
  • Pillar 2 – Malware & cyber attacks explained
  • Pillar 3 – Enterprise & Technical Security
  • Pillar 4 – Critical Infrastructure & Real-World attacks
  • Pillar 5 – Human factors, AI & Cyber Awareness
Wednesday, April 29, 2026
  • 365 days of blogs
  • August

(11/08/23) Blog 223 – Tesla:”Want those heated seats, it’s gonna cost” Hackers: “Hold my beer”

A rising trend among luxury car manufacturers is to install all the necessary fixtures and features into a car, but to prohibit their use with software locks unless the buyer pays a subscription fee t...

Mark
11/08/2023
Read More
  • 365 days of blogs
  • August

(10/08/23) Blog 222 – Bulletproof hosting not so bulletproof after all

<Lolek>Hosted, a domain which provided bulletproof hosting has been seized in an operation involving various agencies and has been taken offline. As is the case in such events, the website at the d...

Mark
10/08/2023
Read More
  • 365 days of blogs
  • August

(09/08/23) Blog 221 – Acoustic side channel attack on keyboards

A paper has been released by three University researchers which looks at side channel attacks against data typed on keyboards using acoustics. Joshua Harrison, Ehsan Toreini, and Maryam Mehrnezhad are...

Mark
09/08/2023
Read More
  • 365 days of blogs
  • August

(08/08/23) Blog 220 – US Hospital network forced offline after cyber attack

16 hospitals and more than 160 other medical facilities across the United States are offline after the latest cyberattack on a U.S. hospital system by an as-yet-unknown attacker. The hospital network ...

Mark
08/08/2023
Read More
  • 365 days of blogs
  • August

(07/08/23) Blog 219 – New privacy tools from Google

Last week, Google announced a number of new privacy tools aimed at allowing users to stay in control of personal information, privacy and staying safer whilst online. Remove yourself from search resul...

Mark
07/08/2023
Read More
  • 365 days of blogs
  • August

(06/08/23) Blog 218 – Op Venetic – another update

Op Venetic – the multi agency operation which cracked the encrypted phone system – Encrochat – used by thousands of criminals has resulted in the prison sentences of a number of Brit...

Mark
06/08/2023
Read More
  • 365 days of blogs
  • August

(05/08/23) Blog 217 – 2022 Top routinely exploited vulnerabilities

A number of the worlds cyber security agencies have released a co-authored cyber security advisory which details the top routinely exploited vulnerabilities for 2022. The report was co-authored by: To...

Mark
05/08/2023
Read More
  • 365 days of blogs
  • August

(04/08/23) Blog 216 – “We didn’t pay a ransom, we reached a settlement”

The insurance company who work on behalf of the Montclair Township’s IT department say that they had reached a settlement figure of USD$450,000 with those responsible for launching a cyber attac...

Mark
04/08/2023
Read More
  • 365 days of blogs
  • August

(03/08/23) Blog 215 – Tempur-Sealy mattress company hit by ALPHAV

Tempur Sealy International, Inc. – the world’s largest bedding provider has been targeted by the Blackcat / ALPHAV ransomware gang. The company, which are based in Lexington, Kentuckey man...

Mark
03/08/2023
Read More
  • 365 days of blogs
  • August

(02/08/23) Blog 214 – Google AMP pages used in phishing URLs

Security researchers have identified a novel way of using Accelerated Mobile Page (AMP) links in phishing attacks to bypass email security measures and get their attacks into the inboxes of enterprise...

Mark
02/08/2023
Read More
1234
Copyright © 2026 Cybertrainer.uk | Powered by News Magazine X