According to a Cloud Security Alliance survey on cloud security issues, insufficient identity, credential, access and key management for privileged…
Browsing: Threat Intelligence
Anyone with any involvement in the world of, what we call Cyber Security, will attest that the world may be…
In The Human Factor Report 2022, security vendor Proofpoint found that SMS phishing (smishing) attacks more than doubled year-on-year in 2021.…
Whilst the conceptual and academic discussions around dangerous forms of code have been on the agenda of decades past, it…
For about a decade now, I have both practiced and taught, what has, up to 2022, seemingly been considered a…
The sad kinetic situation of the Russian war in Ukraine has created much instability on the world stage – observing…
As the world evolves from Web 2.0 to Web 3.0 – think decentralised protocols for crypto assets, identities, and computer-services…
Google Chrome Zero-Day Attack Google Chrome experienced a zero-day attack (a zero-day attack is when a threat actor exploits a…
It has been reported that researchers have disclosed a ‘replay attack’ vulnerability affecting select Honda and Acura car models, that…
What has become so obvious during the sad events unfolding in Ukraine is the power of OSINT, discovering the facts…