(20/08/23) Blog 232 – Anonfiles closes, hackers lose data
Anonfiles - the notorious file upload site used worldwide by regular users and hackers alike…
(19/08/23) Blog 231 – Africa Cyber Surge II – Return of Interpol
A four-month long operation involving international law enforcement officers led by Interpol has led to…
(18/08/23) Blog 230 – QR codes used in phishing attack to bypass email security scanners
A novel approach to phishing has surfaced in a large-scale attack on a major US…
(17/08/23) Blog 229 – 1,000’s of Citrix Netscaler servers hacked
Security researchers at Fox-IT, working in conjunction with the Dutch Institute of Vulnerability Disclosure (DIVD)…
(16/08/23) Blog 228 – Arion Kurtaj faces court proceedings
Back in July, I posted the story of the teenage hacker who was responsible for…
(15/08/23) Blog 227 – Welcome Veilid – the new, open-source app framework from one of the original hacking groups
Last Friday (11/08/23) a new framework for application developers was announced at DEFCON which aims…
(14/08/23) Blog 226 – The future of (no) passwords
For many people, juggling multiple passwords becomes not only a chore, but also a systematic…
(13/08/23) Blog 225 – Checkmate – Knight ransomware posing as TripAdvisor complaint
A Security researcher at Sophos has discovered a ransomware campaign which attempts to infiltrate a…
(12/08/23) Blog 224 – Ford discloses software vulnerability in the SYNC3 infotainment system
Yesterday I posted news about how security researchers have managed to compromise a Tesla allowing…