(24/04/23) Blog 114 – OSINT pt3
In my last post in this min-series on OSINT, I covered some of the techniques…
(23/04/23) Blog 113 – OSINT pt2
In the 2nd post of this mini-series on OSINT, I'll take a look at how…
(22/04/23) Blog 112 – OSINT pt1
We are constantly advised to be careful when posting things online as our data could…
(21/04/23) Blog 111 – Capita breach – Customer data may have been affected
It's the news most have been expecting, but has taken almost a month for it…
(20/04/23) Blog 110 – ACRO offline, criminal records bureau hit by cyber attack
ACRO - The UK's national office which manages criminal record information and the exchange of records with…
(19/04/23) Blog 109 – Get prepared, Spandex Tempest is out to get you!
Yesterday (18/04/23) Microsoft announced that they had a new taxonomy for naming threat actors they…
(18/04/23) Blog 108 – LockBit gang targeting MacOS
I've written a number of posts about the LockBit gang so far this year, but…
(17/04/23) Blog 107 – Malware, a reference guide
Malware (a portmanteau of malicious software) is the term used to describe any software intentionally designed to cause disruption to…
(16/04/23) Blog 106 – RaidForums – an Exposé
RaidForums was a notorious marketplace for criminals to purchase stolen data, hacking tools, and pornographic…