COVID-19 Cyber Situation Update – 31 March Despite increasingly stringent measures being taken to slow the outbreak, both in UK hospitals…
When physical infection mirrors cyber infection There are significant parallels between the responses of governments and national healthcare organisations to…
Conflict between US and Iran escalates to new level On 3 January 2020 the news broke that President Trump had ordered an airstrike…
Packing heat: the rise of credential stuffing in 2019 Credential stuffing, a simple attack that involves running lists of stolen credentials against various…
Targeting energy: nuclear and wind power This week it was reported that the 1000MW Kudankulam Nuclear Power Plant (KKNPP), owned…
Extinction Rebellion: demanding action on climate change The environmental campaign group Extinction Rebellion began a new series of well-publicised protests on…
Using social media: China’s government furthers its own agenda Huge street demonstrations have been taking place in Hong Kong since June this year.…
Hacking Capital One and inviting arrest On 29 July it was reported that Capital One had been hit by a…
Confidential company documents exposed in public sandboxes Introduction Over the course of three days (12 – 15 August 2019) we monitored…
WiFi, MiFi and using public networks Some of our recent blog articles have focused on how we can protect our…
Protecting our children’s data That more and more of our personal data is collected and shared – whether…
Analysing a Brazilian dotNET banker We recently analysed an interesting new dotNet banker from Brazil. The malware is not…