Skip to content
Latest posts

It’s official – Ditch the password – time to start using passkeys

Microsoft finally update RDP connections

NCA 2026 National Strategic Assessment of Serious Organised Crime

DualStrike – Real-time attacks against commodity keyboards

Is it time to replace BGP? SCION thinks so

KadNap Botnet compromises 14K+ devices worldwide

Cybertrainer.uk
Cybertrainer.uk

Helping build cyber security awareness

  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
Menu
  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
  • Pillar 1 – Ransomware & cybercrime
  • Pillar 2 – Malware & cyber attacks explained
  • Pillar 3 – Enterprise & Technical Security
  • Pillar 4 – Critical Infrastructure & Real-World attacks
  • Pillar 5 – Human factors, AI & Cyber Awareness
Saturday, May 2, 2026
  • 365 days of blogs
  • October

(21/10/23) Blog 294 – Ragnar_Locker taken down by law agencies across the world

This week saw a combined effort from law enforcement and judicial authorities from eleven countries deliver a major blow to one of the most dangerous ransomware operations of recent years. The Ragnar_...

Mark
21/10/2023
Read More
  • 365 days of blogs
  • October

(20/10/23) Blog 293 – WinRAR vulnerability used by state-backed threat actors

Google’s Threat Analysis Group (TAG) have released a statement this week showing that multiple government-backed threat actors are actively exploiting a vulnerability within the WinRAR archiving...

Mark
20/10/2023
Read More
  • 365 days of blogs
  • October

(19/10/23) Blog 292 – Trigona ransomware gang hacked by Ukrainian Cyber Alliance

A post uploaded yesterday by @vx_herm1t on X shows the current home page of Russian ransomware gang Trigona and that it has appears to have been completely wiped out by the Ukrainian Cyber Alliance. W...

Mark
19/10/2023
Read More
  • 365 days of blogs
  • October

(18/10/23) Blog 291 – Encryption – a short guide (pt5)

In the last post, I discussed the properties of cryptographic keys, and the different types of keys used in cryptography. One of the examples I gave was the one of key exchange, and that in modern sys...

Mark
18/10/2023
Read More
  • 365 days of blogs
  • October

(17/10/23) Blog 290 – Encryption – a short guide (pt4)

So far in this short guide to encryption, we have looked at some of the terms associated with an encryption system, and some of the desirable qualities such a system should have. We have explained the...

Mark
17/10/2023
Read More
  • 365 days of blogs
  • October

(16/10/23) Blog 289 – Encryption – a short guide (pt3)

One of the desirable properties of an encryption system is that of high variance, or entropy. The larger the number of possible values in a key, the harder it is to work out what the key could be. In ...

Mark
16/10/2023
Read More
  • 365 days of blogs
  • October

(15/10/23) Blog 288 – Encryption – a short guide (pt2)

In the previous post, I identified a few common terms used in encryption, and then identified some early examples of ancient encryption . In those early methods of securing data, we see three more fun...

Mark
15/10/2023
Read More
  • 365 days of blogs
  • October

(14/10/23) Blog 287 – Encryption – a short guide (pt1)

We all know encryption is the no.1 tool used to keep data private – we hear it mentioned everywhere, but to many it’s just some magical thing involving hard maths that just works right? We...

Mark
14/10/2023
Read More
  • 365 days of blogs
  • October

(13/10/23) Blog 286 – Supply chain attacks – what are they? and why do they matter?

SolarWinds, MoveIT, NotPetya, CCleaner, Equifax, Target. All the above names have one thing in common – at some point, all of these have been involved in large supply chain attacks which have af...

Mark
13/10/2023
Read More
  • 365 days of blogs
  • October

(12/10/23) Blog 285 – Google Passkeys now the default option

On Tuesday (10th) Google announced that Passkeys were now the default sign-in option across all personal Google accounts across all services and devices. This step will make using Google products a mu...

Mark
12/10/2023
Read More
1234
Copyright © 2026 Cybertrainer.uk | Powered by News Magazine X