Bypassing Windows security with DLL search order hijacking
Security researchers at securityjoes.com have published a paper detailing a new mechanism that allows threat…
(31/12/23) Blog 365 – The end of the year – the end of my challenge
Well - that's it. That's the end of 2023, and the end of my 365…
(30/12/23) Blog 364 – German Hospitals ransomed by chancer
The German hospital network atholische Hospitalvereinigung Ostwestfalen (KHO) has confirmed that it has been the…
(29/12/23) Blog 363 – NASA launches space industry cyber security guide
As the latest space race hots up, NASA has published its first Space Security Best…
(28/12/23) Blog 362 – EU member states reach common position on “Cyber Solidarity Act”
Member states of the European union have reached a common position with regards to the…
(27/12/23) Blog 361 – Europes largest parking company compromised
EasyPark group who own parking apps RingGo and ParkMobile says an unknown threat actor compromised…
(26/12/23) Blog 360 – Outlook notification sounds can lead to system compromise
Ben Barnea - a security researcher working for Akamai has discovered a novel way of…
(25/12/23) Blog 359 – Wall of Flippers – detects and blocks Bluetooth spam attacks
The Flipper zero is a very well known device in the world of Hacking /…
(24/12/23) Blog 358 – Possible LockBit & AlphaV cabal?
The recent take-down of the AlphaV Command and Control network has dealt a major blow…