Skip to content
Latest posts

It’s official – Ditch the password – time to start using passkeys

Microsoft finally update RDP connections

NCA 2026 National Strategic Assessment of Serious Organised Crime

DualStrike – Real-time attacks against commodity keyboards

Is it time to replace BGP? SCION thinks so

KadNap Botnet compromises 14K+ devices worldwide

Cybertrainer.uk
Cybertrainer.uk

Helping build cyber security awareness

  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
Menu
  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
  • Pillar 1 – Ransomware & cybercrime
  • Pillar 2 – Malware & cyber attacks explained
  • Pillar 3 – Enterprise & Technical Security
  • Pillar 4 – Critical Infrastructure & Real-World attacks
  • Pillar 5 – Human factors, AI & Cyber Awareness
Wednesday, April 29, 2026
  • 365 days of blogs
  • September

(30/09/23) Blog 273 – New Internet proposal to end web snooping

A new proposal has been approved by the Internet Engineering Task Force (IETF) which , if passed as a standard, could put an end to the snooping of web browsing activity. TLS Encrypted Client Hello (E...

Mark
30/09/2023
Read More
  • 365 days of blogs
  • September

(29/09/23) Blog 272 – Joint security advisory warns of Chinese router backdoor activity

A joint security advisory released on the 27th September by the US and Japan outlines APT activity which has been generating backdoor capabilities against router firmware to facilitate long-term netwo...

Mark
29/09/2023
Read More
  • 365 days of blogs
  • September

(28/09/23) Blog 271 – New hacking team claim 1st big scalp

A fairly new hacking gang has emerged on the scene with a claim to have stolen 27Tb of sensitive data from one of the worlds largest building automation companies – Johnson controls. The gang go...

Mark
28/09/2023
Read More
  • 365 days of blogs
  • September

(27/09/23) Blog 270 – The devastating effect of ransomware

Throughout this year, I’ve posted numerous times about ransomware attacks – stories about the Internets biggest threat, the criminal gangs behind the attacks, and some of the companies aff...

Mark
27/09/2023
Read More
  • 365 days of blogs
  • September

(26/09/23) Blog 269 – Yet another crypto exchange gets hacked

As the title of this post states, another crypto-currency exchange has been hacked, this time with the loss of approximately $200M USD. Early yesterday morning (25th), The Mixin exchange posted on twi...

Mark
26/09/2023
Read More
  • 365 days of blogs
  • September

(25/09/23) Blog 268 – Phishing, SMShing, Vishing, now Quishing

Most people are aware of the various tactics employed by many cyber criminals that attempt to get a victim to divulge sensitive data – Phishing, SMSishing, and Vishing. Well there’s a new ...

Mark
25/09/2023
Read More
  • 365 days of blogs
  • September

(24/09/23) Blog 267 – Russian hackers target Bermuda Government

In a statement on Thursday (21st), the Government of the British overseas territory of Bermuda said that they had suffered a cyber attack which has affected all departments. In a press conference, Dav...

Mark
24/09/2023
Read More
  • 365 days of blogs
  • September

(23/09/23) Blog 266 – It’s a Hacker-eats-hacker world out there…

A hacker using the name whalersplonk is spreading a fake Proof-of-Concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect those who download it VenomRAT malware...

Mark
23/09/2023
Read More
  • 365 days of blogs
  • September

(22/09/23) Blog 265 – Microsoft researchers accidentally expose 38TB of data

A team of researchers from Microsoft’s AI division published a bucket of open-source training data on GitHub, accidentally exposed 38 terabytes of additional private data – including a disk back...

Mark
22/09/2023
Read More
  • 365 days of blogs
  • September

(21/09/23) Blog 264 – New Linux backdoor malware identified

Researchers from Trend Micro have discovered a new backdoor for Linux which they have named SprySOCKS. The origins of this new malware come from a 2015 Windows backdoor named Trochilus which executes ...

Mark
21/09/2023
Read More
123
Copyright © 2026 Cybertrainer.uk | Powered by News Magazine X