The holiday season is just around the corner and many people will be taking a break from the hustle and bustle of workday life, but unfortunately, most people will not be taking a break from their tec...
In my last post in this min-series on OSINT, I covered some of the techniques used in the sub-category of SOCMINT and how posting data across social media could allow a threat actor to uncover sensiti...
In the 2nd post of this mini-series on OSINT, I’ll take a look at how social media can be used as part of an OSINT investigation. The sub-topic of SOCMINT -Social Media Intelligence. Oversharing...
We are constantly advised to be careful when posting things online as our data could be used by cyber criminals to conduct nefarious acts against us. Whilst this is very true, one thing which is often...
It’s the news most have been expecting, but has taken almost a month for it to be made public. Start of the attack On the 31st March, staff at Capita, the UK’s largest business process out...
ACRO – The UK’s national office which manages criminal record information and the exchange of records with other countries, along with checks to see whether a suspect in the UK has crimina...
Yesterday (18/04/23) Microsoft announced that they had a new taxonomy for naming threat actors they track. According to the announcement, the new taxonomy is intended “to bring better clarity to...
I’ve written a number of posts about the LockBit gang so far this year, but this post is something new for them and other ransomware gangs. Details are emerging online that the LockBit gang have...
Malware (a portmanteau of malicious software) is the term used to describe any software intentionally designed to cause disruption to a computer or computer network, leak private information, gain una...
RaidForums was a notorious marketplace for criminals to purchase stolen data, hacking tools, and pornographic material and was active for almost 7 years. Unusually for such a popular criminal website,...