-
EXPLOITS
Why is Jersey introducing a new Cyber Security Law?
In 2021 I took a new role as Director of Jersey’s newly formed cyber response unit. We’ve come a long…
Read More » -
INSIDER
Think Before You Click: EPI PDF’s Hidden Extras
Authored by: Anuradha & Prabudh PDF converting software can be super helpful. Whether you’re turning a Word document into a…
Read More » -
JACKING
Proactive Security for CVE-2025-53770 and CVE-2025-53771 SharePoint Attacks
Post-Exploitation Analysis Our analysis reveals that threat actors are leveraging the initial compromise for comprehensive enterprise reconnaissance and data theft.…
Read More » -
PHISHING
Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation
The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a…
Read More » -
SPYWARE
What is Cryptojacking Attack ❓ Definition and Prevention | by Ivan Novikov
Introduction A conceivable threat to cryptocurrency owners, cryptojacking is an attack using which threat attackers can mine cryptocurrency at the…
Read More » -
WEB ATTACK
My Last Email with W. Richard Stevens
In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book TCP/IP Illustrated, Volume…
Read More » -
EXPLOITS
My Story from the Spanish Blackout
Hello Cyber-Builders 🖖 In 2017, I published a paper with NATO experts on what had happened to the Ukrainian power…
Read More » -
INSIDER
You don’t start a platform, you earn the right to become one
In cybersecurity, “platform” is the most abused word, used by every startup with two engineers and a feature flag. We…
Read More » -
WEB ATTACK
Black Hat Fireside Chat: Automation takes center stage as TLS lifespans grow ever shorter
The countdown is on for security teams still managing digital certificates with spreadsheets and manual workarounds. Related: Preparing for the…
Read More » -
CLOUD
Welcoming Guardio to Have I Been Pwned’s Partner Program
I’m often asked if cyber criminals are getting better at impersonating legitimate organisations in order to sneak their phishing attacks…
Read More »