January 16, 2019 - While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.
January 11, 2019 - Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?
December 26, 2018 - In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
October 23, 2018 - What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?
October 10, 2018 - A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.
October 4, 2018 - Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines.
September 28, 2018 - Magecart and other criminal groups are causing mayhem by stealing payment information from e-commerce sites, big and small. Learn how they are doing it and how to mitigate against it.
June 27, 2018 - A website belonging to an eatery currently making waves in the news has been compromised with SEO spam. We take a look at what's happened, and explain what the hackers are up to.
June 15, 2018 - Reports claim that UK law enforcement are still struggling to get to grips with cybercrime. We take a look at what's going on, and why services aren't able to cope with all things digital.
May 30, 2018 - Security researchers have now found new ways to exploit voice recognition weaknesses in your favorite home device: smart assistants. You may want to listen in.