A cyber security professional needs to understand many things in order to have some level of success in defending the systems in their care – A small sample of those things include: Within those...
In an operation spanning multiple years, and multiple jurisdictions, one of the worlds most wanted cyber criminals has finally been taken to the US to face justice for crimes committed that stretch ba...
Active Cyber Defence (ACD) is the title given to a range of technologies and processes set up by the NCSC to help make the UK the safest place to live and do business online. Active Cyber Defence (ACD...
A threat actor known online as USDoD has posted a data dump containing 2.7 billion records, and says that it contains the Personally Identifiable Information (PII) for all citizens of the United State...
Inspiration for my posts comes from different places – news events mostly, but they also come from things that happen in my everyday life. The inspiration for this post comes from a topic on Alt...
This week, the National Crime Agency (NCA) announced the successful takedown of a Crimeware As A Service (CaaS) platform that offered the ability to spoof telephone numbers which was used by criminals...
Watch any Hollywood movie that contains a scene where a nerd is tasked with hacking some IT system and its a flurry of fingers across a keyboard and then a few seconds later, the immortal shout of ...
Security analysts working for Baltimore-based Industrial Control Systems (ICS) security company – Dragos have released an in-depth review of their findings into a new malware which they have nam...
Checkmate Cyber-crims! The NCA (National Crime Agency) in association with the PSNI (Police Service of Northern Ireland) and the US FBI (Federal Bureau of Investigations) have announced this week the ...
For many people, the ability to customise their computer work space is a wonderful thing – the ability to change colour schemes, sounds, wallpapers, etc. is something that allows them to express...









