(20/10/23) Blog 293 – WinRAR vulnerability used by state-backed threat actors
Google's Threat Analysis Group (TAG) have released a statement this week showing that multiple government-backed…
(19/10/23) Blog 292 – Trigona ransomware gang hacked by Ukrainian Cyber Alliance
A post uploaded yesterday by @vx_herm1t on X shows the current home page of Russian…
(18/10/23) Blog 291 – Encryption – a short guide (pt5)
In the last post, I discussed the properties of cryptographic keys, and the different types…
(17/10/23) Blog 290 – Encryption – a short guide (pt4)
So far in this short guide to encryption, we have looked at some of the…
(16/10/23) Blog 289 – Encryption – a short guide (pt3)
One of the desirable properties of an encryption system is that of high variance, or…
(15/10/23) Blog 288 – Encryption – a short guide (pt2)
In the previous post, I identified a few common terms used in encryption, and then…
(14/10/23) Blog 287 – Encryption – a short guide (pt1)
We all know encryption is the no.1 tool used to keep data private - we…
(13/10/23) Blog 286 – Supply chain attacks – what are they? and why do they matter?
SolarWinds, MoveIT, NotPetya, CCleaner, Equifax, Target. All the above names have one thing in common…
(12/10/23) Blog 285 – Google Passkeys now the default option
On Tuesday (10th) Google announced that Passkeys were now the default sign-in option across all…