With names straight out of an Ian Fleming novel, you would be forgiven in thinking that this post was all about 007’s latest adventures, but in fact it’s a post about transient execution C...
Energy One, a provider of software solutions to the wholesale energy market disabled a number of vital services late last week after it became aware of a cyber attack on its network. The company provi...
A series of raids across Thailand by the Thai cyber police has led to a number of arrests, the dismantling of a fraudulent call centre, the closure of a scam crypto fund, and the seizure of a large ha...
Anonfiles – the notorious file upload site used worldwide by regular users and hackers alike has closed. The site owners / administrators closed the site last week citing an an endless stream of...
A four-month long operation involving international law enforcement officers led by Interpol has led to the arrest of 14 suspected cyber criminals across 25 African nations, including: The operation w...
A novel approach to phishing has surfaced in a large-scale attack on a major US energy supplier. The attack begins with a phishing email that claims the recipient must take action to update their Micr...
Security researchers at Fox-IT, working in conjunction with the Dutch Institute of Vulnerability Disclosure (DIVD) have released an advisory this week which details a global hack of almost 2,000 Citri...
Back in July, I posted the story of the teenage hacker who was responsible for the attacks on Rockstar games, Uber, and revolut. At that time, the news was that Southwark crown court had lifted report...
Last Friday (11/08/23) a new framework for application developers was announced at DEFCON which aims to provide developers the ability to build distributed, private applications free from the commerci...
For many people, juggling multiple passwords becomes not only a chore, but also a systematic failure in the protection of accounts and services. We all know the principles of good password hygiene*, i...