(19/10/23) Blog 292 – Trigona ransomware gang hacked by Ukrainian Cyber Alliance
A post uploaded yesterday by @vx_herm1t on X shows the current home page of Russian…
A post uploaded yesterday by @vx_herm1t on X shows the current home page of Russian…
In the last post, I discussed the properties of cryptographic keys, and the different types…
So far in this short guide to encryption, we have looked at some of the…
One of the desirable properties of an encryption system is that of high variance, or…
In the previous post, I identified a few common terms used in encryption, and then…
We all know encryption is the no.1 tool used to keep data private - we…
SolarWinds, MoveIT, NotPetya, CCleaner, Equifax, Target. All the above names have one thing in common…
On Tuesday (10th) Google announced that Passkeys were now the default sign-in option across all…
Microsoft have just released the latest Digital Defence Report, and the findings are not great.…
It's a well known fact that cyber attacks are becoming more and more commonplace in…