(10/10/23) Blog 283 – Boots on the ground – coders in the cloud
It's a well known fact that cyber attacks are becoming more and more commonplace in…
(09/10/23) Blog 282 – Fancy earning yourself $12k? Easy – just crack elliptic curve…
Cryptography specialist Filippo Valsorda has issued a challenge for the first person to crack the…
(08/10/23) Blog 281 – ShinyHunters hacker pleads guilty to wire fraud & identity theft
Twenty-Two year-old Sebastien Raoult, a French citizen from the eastern town of Epinal has submitted…
(07/10/23) Blog 280 – Mobile provider Lyca MobileUK hit with cyber attack
Last weekend, users of the mobile network Lyca started to experience difficulties using the network,…
(06/10/23) Blog 279 – Looney Tunables – that’s all folks!
A number of Proof-Of-Concept (PoC) exploits have surfaced on the Internet which target a high-severity…
(05/10/23) Blog 278 – Hacktivist rules of engagement released
The International Committee of the Red Cross (ICRC) has issued a first-of-its-kind rules of engagement…
(04/10/23) Blog 277 – LockBit exfil infrastructure exposed
Researchers at securityaffairs have released an fascinating insight in to the global infrastructure used by…
(03/10/23) Blog 276 – BunnyLoader – new malware spreading faster than rabbits
Security researchers at Zscaler have discovered a new malware-as-a-service (MaaS) named 'BunnyLoader' being advertised on…
(02/10/23) Blog 275 – Operation DreamJob targets victims via LinkedIn
North Korean hacking group - Lasarus are currently running a targeted campaign against people in…