Skip to content
Latest posts

It’s official – Ditch the password – time to start using passkeys

Microsoft finally update RDP connections

NCA 2026 National Strategic Assessment of Serious Organised Crime

DualStrike – Real-time attacks against commodity keyboards

Is it time to replace BGP? SCION thinks so

KadNap Botnet compromises 14K+ devices worldwide

Cybertrainer.uk
Cybertrainer.uk

Helping build cyber security awareness

  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
Menu
  • Welcome
  • Courses
  • Reading suggestions
  • Useful resources
  • 365 days of blogs
  • Blogs
  • Tech corner
  • e-books
  • Self-Hosting
  • Pillar 1 – Ransomware & cybercrime
  • Pillar 2 – Malware & cyber attacks explained
  • Pillar 3 – Enterprise & Technical Security
  • Pillar 4 – Critical Infrastructure & Real-World attacks
  • Pillar 5 – Human factors, AI & Cyber Awareness
Wednesday, April 29, 2026

Mark

  • General blogs

It’s official – Ditch the password – time to start using passkeys

I’ve written about the use of passkeys in favour of passwords a few times over the last couple of years (see below), and this week sees a publication of a paper by the UK’s NCSC that re-en...

Mark
23/04/2026
Read More
  • General blogs

Microsoft finally update RDP connections

Microsoft have pushed out a number of updates in their April 2026 release, and one of them has been a long time coming – An update to how Windows handles RDP connectivity The main change for thi...

Mark
22/04/2026
Read More
  • General blogs

NCA 2026 National Strategic Assessment of Serious Organised Crime

The UK’s National Crime Agency (NCA) published its 2026 National Strategic Assessment of Serious and Organised Crime (SOC) in March, and the message is unequivocal: technology is no longer just an ena...

Mark
15/04/2026
Read More
  • General blogs

DualStrike – Real-time attacks against commodity keyboards

A paper written by security researchers from Shanghai Jiao Tong University & UCLA Irvine which was revealed at the 2026 Network and Distributed System Security (NDSS) Symposium has identified the ...

Mark
09/04/2026
Read More
  • General blogs

Is it time to replace BGP? SCION thinks so

For four decades, the Border Gateway Protocol (BGP) has functioned as the glue holding the internet together. It was designed to route packets between thousands of networks on the internet (A.K.A. Aut...

Mark
18/03/2026
Read More
  • General blogs

KadNap Botnet compromises 14K+ devices worldwide

Security researchers at Black Lotus Labs have uncovered a sophisticated new malware called “KadNap” that has secretly hijacked over 14,000 devices worldwide to create a massive botnet. If ...

Mark
15/03/2026
Read More
  • General blogs

Coruna: A very powerful iOS exploit kit

Google’s Threat Intelligence Group (GTIG) has uncovered a massive new iOS exploit kit dubbed “Coruna”. The malware targets Apple iPhone models running iOS 13.0 through to iOS 17.2.1,...

Mark
08/03/2026
Read More
  • General blogs

Securing the Post-Quantum Web: Chrome’s shift to Merkle Tree Certificates

The impending reality of quantum computing poses a significant threat to the cryptographic standards that secure the Internet today. To stay ahead of this threat, the developers of Google Chrome have ...

Mark
03/03/2026
Read More
  • General blogs

USB – not all as it may seem

We all have one. It might be a box, an old carrier bag, or even a dedicated drawer – A tangled collection of USB cables that we simply can’t bring ourselves to throw away “I might ne...

Mark
03/03/2026
Read More
  • General blogs

AirSnitch – a MiTM attack for Wi-Fi

Most people who use a guest Wi-Fi network, such as the one in a hotel, or the local coffee shop assume that their device and communications are secure, and for a number of years this has been the case...

Mark
28/02/2026
Read More
123...43
Copyright © 2026 Cybertrainer.uk | Powered by News Magazine X