The Case of the Disappearing Databases
Shodan is an extremely useful tool for checking what devices your network may have listening on the Internet, or for…
The Case of the Disappearing Databases Read More »
Shodan is an extremely useful tool for checking what devices your network may have listening on the Internet, or for…
The Case of the Disappearing Databases Read More »
Executive Summary Cyber threat actors are expected to increase their attacks as the 2020 US Presidential Election approaches.
Geopolitics and Cybersecurity Weekly Brief – 12 October 2020 Read More »
Executive Summary This week government departments and industry bodies continued to warn about the ZeroLogon vulnerability (CVE-2020-1472). In the US,
Geopolitics and Cybersecurity Weekly Brief – 28 September 2020 Read More »
What is an IOC? Indicators of Compromise, shortened to IOCs, are relatively varied, but generally constitute the URLs,
IOCs – Gotta Catch ‘Em All? Read More »
Introduction Our team was recently alerted to a well-made phishing page targeting a large UK bank. During our
Two-Factor Fail: Analysis of a modern phishing kit Read More »
New research from the United Nations’ Counter-Terrorism Committee Executive Directorate (UN-CTED) has shown a 320% increase in the
The far-right, Black Lives Matter and domestic terrorism Read More »
The full Cyber Threat Brief for Critical Infrastructure can be downloaded here. There has been a significant uptick
COVID-19 Critical Infrastructure Cyber Threat Brief Read More »
In this post, we hope to demystify some of the most common malware delivery methods that modern threat
Special delivery: common malware propagation methods Read More »