-
Malware: A month in review – February 2018
The main trend in malware in February, as it was in January and had been throughout 2017,…
-
Processor vulnerabilities raise the Spectre of global Meltdown
2018 started with a bang when, on 3 January, Google Project Zero dropped a bomb in the…
-
Third-party suppliers: the weakest link?
Nearly every single organisation has third-party suppliers, and with these external services comes risk. Two areas to…
-
Hiding in Plain Sight – Child Abusers on the Darknet
The growing popularity of Tor and other anonymising tools has provided unprecedented opportunities for paedophiles to view…
-
Darknet markets: no honour among thieves
Ever since the takedown of AlphaBay back in July 2017, the Darknet marketplaces have been plunged into…
-
Vulnerability situational awareness
Vulnerabilities are ubiquitous across nearly everyone’s network infrastructure, and managing them is a monumental task. Staying on…
-
Street activism meets online hacktivism in Catalonia
The recent push for independence in Catalonia has highlighted the part that cyber hacktivism can play in…
-
Darknet web design services on the rise
After the recent chaos of Darknet marketplaces being shut down by law enforcement and site admins performing…
-
Keystone pipeline oil spill in South Dakota could lead to new cyber campaigns
In South Dakota, reports have emerged of an oil spill: TransCanada has announced that the Keystone pipeline…
Receive our latest cyber intelligence insights delivered directly to your inbox
Simply complete the form to subscribe to our newsletter, ensuring you stay informed about the latest cyber intelligence insights and news.