(23/10/23) Blog 296 – 50k + Cisco devices hacked with 0-day
Over 50,000 Cisco XE devices have been compromised via a preciously unknown vulnerability. Cisco discovered…
(22/10/23) Blog 295 – PassKey usage starting to increase
Just over a week ago, I posted that Google had now made the use of…
(21/10/23) Blog 294 – Ragnar_Locker taken down by law agencies across the world
This week saw a combined effort from law enforcement and judicial authorities from eleven countries…
(20/10/23) Blog 293 – WinRAR vulnerability used by state-backed threat actors
Google's Threat Analysis Group (TAG) have released a statement this week showing that multiple government-backed…
(19/10/23) Blog 292 – Trigona ransomware gang hacked by Ukrainian Cyber Alliance
A post uploaded yesterday by @vx_herm1t on X shows the current home page of Russian…
(18/10/23) Blog 291 – Encryption – a short guide (pt5)
In the last post, I discussed the properties of cryptographic keys, and the different types…
(17/10/23) Blog 290 – Encryption – a short guide (pt4)
So far in this short guide to encryption, we have looked at some of the…
(16/10/23) Blog 289 – Encryption – a short guide (pt3)
One of the desirable properties of an encryption system is that of high variance, or…
(15/10/23) Blog 288 – Encryption – a short guide (pt2)
In the previous post, I identified a few common terms used in encryption, and then…