Tags
May 2025
May 2025
- TeleMessage
- Telecommunications
- SK Telecom
- Signalgate
- Signal
- Robin’s Newsletter - Volume 8
- Residential Proxies
- Ransomware
- Passwords
- Password
- Info stealer
- Florida
- End-to-end encryption (E2EE)
- Department of Government Efficiency (DOGE)
- CyberUK
- CrowdStrike
- China
- Business Email Compromise
- Bug bounty
- TikTok
- Scattered Spider
- RSA Conference
- RSA
- Retail
- Remote Desktop Protocol (RDP)
- Offensive Cyber
- North Korean IT Workers
- North Korean
- North Korea
- Microsoft
- Marks & Spencer
- Lapsus
- Juice Jacking
- Iran
- Insider
- Harrods
- Energy Grid
- Energy
- Electricty
- DragonForce
- Co-op
- British Library
- AirPlay
- AirBorne
April 2025
April 2025
- World Economic Forum (WEF)
- Verizon
- University of Oxford
- Third Party
- Supply chain
- Software-as-a-Service (SaaS)
- Secure Future Initiative
- SAP
- Salt Typhoon
- Post Office
- Meta
- JP Morgan
- Internet Crime Complain Center (IC3)
- Horizon IT Scandal
- Fujitsu
- Digital Markets Act (DMA)
- Data Breach Investigation Report (DBIR)
- Data Breach
- Cybersecurity and Infrastructure Agency (CISA)
- Cyber Resilience Compass
- Apple
- Whistleblower
- Webex
- Taiwan
- Subsea cables
- Social Mediau Use by Minors
- SentinelOne
- Sabotage
- ResolverRAT
- Prompt injection
- National Labor Relations Board (NLRD)
- MITRE
- Microsoft Exchange
- Hacktivism
- File transfer
- Digital certificates
- Department of Homeland Security (DHS)
- CyberAv3ngers
- Conduent
- Common Vulnerability and Exposures (CVE)
- Cleo
- Chris Krebs
- CApabilities for MachinE Learning (CaMeL)
- Capabilities
- 4chan
- US Treasury
- UK Home Office
- UK
- Technical Capability Notice (TCN)
- Spyware
- Sean Plankey
- Pall Mall Pact
- Oracle Cloud
- Oracle
- Office of the Comptroller of the Currency (OCC)
- Morocco
- JabaROOT
- Ivanti
- Gladinet
- General Data Protection Regulation (GDPR)
- General Data Protection Regulation
- Fortinet
- Czech Republic
- Cybersecurity and Infrastructure Security Agency (CISA)
- Communications Assistance for Law Enforcement Act (CALEA)
- Communication
- Cell C
- Black Basta
- AI Code Assistants
- Tariffs
- Royal Mail
- ReliaQuest
- Pensions
- Paul Nakasone
- Operation Stream
- Michael Waltz
- GCHQ
- Fast Flux
- Domain Name System (DNS)
- Credential stuffing
- Child Sexual Abuse Material (CSAM)
- Bletchley Park
- 23andMe
March 2025
March 2025
- “Rail”
- “Metropolitan Police”
- Ukraine
- Troy Hunt
- Sovereignty
- Snowflake
- Railway
- Privileged Access Workstation (PAW)
- Oracle Health
- Nginx
- National Security
- Malaysia
- Kubernetes
- Kuala Lumpur International Airport (KLIA)
- Journalist
- Jeffery Goldberg
- HaveIBeenPwned
- Facial Regognition
- Cloud hyperscalers
- Cloud
- “Drones”
- Wiz
- Veeam
- Ukraine IT Army
- Scam baiting
- Scam
- Post-Quantum Cryptography (PQC)
- Post-Quantum Cryptography
- Paige Thompson
- Online Safety Act
- New York Police Department (NYPD)
- IBM AIX
- IBM
- Google Cloud Platform
- Drones as First Responders (DFR)
- Cryptography
- Clearview AI
- Capital One
- Capita
- Artificial Intelligence (AI)
- Art
- Arcane (infostealer)
- Apache Tomcat
- Alphabet
- UK Cyber Sector
- Uber
- Surveillance
- PowerSchool
- Medusa
- LockBit
- Joe Sullivan
- Investigatory Powers Tribunal
- Investigatory Powers Act
- Investigatory Powers
- Google Play Store
- Google Play
- Garantex
- Fraud
- Education
- Cybersecurity and Infrastrcuture Agency (CISA)
- Critical national infrastructure
- ClickFix
- BRUTED
- Back door
- VMware
- United States of America
- Silk Typhoon
- Russia
- NTT Communications
- Money laundering
- Information Commissioner’s Office (ICO)
- Imgur
- I-Soon
- Garatex
- Finland
- Cyberreason
- Cyber policy
- Cryptocurrency
- Bridewell
- Wallbleed
- Thailand
- Southern Water
- Scam Call Centres
- Romance scams
- Romance Scam
- Operational Technology (OT)
- Operational Technology
- Myanmar
- Lazarus Group
- Lazarus
- DISA Global Solutions
- Bybit
February 2025
February 2025
- Ghost Tap
- PeerAuth
- Device code phishing
- Cybercrime
- BBC
- Artifical Intelligence (AI)
- AI Summaries
- UK Government
- Toerrenting
- Secure by design
- Secure by Default
- Scammers
- Rhode Island
- Pirate
- People Trafficking
- Optical Character Recognition (OCR)
- Jailbreak
- Distributed Denial of Service (DDoS)
- Cyber Monitoring Centre (CMC)
- Cyber Assessment
- Antitrust
- Access and Assistance Act
- Abandoned Infrastructure
- “MGM Resorts”
- Unforgiveable vulnerabilities
- UK Cyber Security Strategy
- Removing Our Unsecure Technologies to Ensure Reliability and Security (ROUTERS)
- Privacy
- Operation Talent
- Operation Heart Blocker
- OpenAI
- National Audit Office (NAO)
- DeepSeek
- Cryptomining
- ChatGPT
January 2025
January 2025
- TalkTalk
- Subaru
- SonicWall
- Script Kiddies
- PowerSchools
- Ministry of Justice (MoJ)
- Legal
- Juniper
- Jen Easterley
- Horizon IT System
- Homebrew
- Geolocation
- Europe
- Electricity grid
- Cybersecurity Safety Review Board (CSRB)
- Cybersecurity Advisory Committee (CSAC)
- Cyber risk quantification (CRQ)
- Cyber Risk
- Cyber diplomacy
- Connected vehicles
- Compliance
- Cisco
- Attack vectors
- AT&T
- WordPress
- Tracking
- Takedown
- Synnovis
- Otelier
- Insurance
- Hotel
- GoDaddy
- Federal Trade Commission (FTC)
- FastHTTP
- Discord
- Computer games
- Codefinger
- Clop
- Amazon Web Services (AWS)
- Amazon
- Allstate
- Zero-day
- Venture Capital
- Ukraine Cyber Alliance
- Tencent
- Slovakia
- Quorum Cyber
- Nominet
- Model poisonning
- Governance
- Espionage
- Committee of Foreign Investment in the United States (CFIUS)
- Chrome Web Store
- Automatic Number Plate Recognition (ANPR)
- “Captcha”
- Web Browser Extensions
- United Nations
- Tesla
- Sanctions
- Organised crime
- Operation Destabilise
- Integrity Technology (aka Yongxin Zhicheng)
- Integrity
- Flax Typhoon
- Doom
- Cybercrime Convention
- Cyber-norms
- Conneced Vehicles
December 2024
December 2024
- Robin’s Newsletter - Volume 7
- United Health Group
- TP-Link
- Romance baiting
- Recorded Future
- Pig butchering
- Nebraska
- Jailbreaking
- Gaming
- False Claims Act
- Device security
- Change Healthcare
- User Experience (UX)
- Telco
- Sovereign internet
- Secure and Trusted Communications Act
- Runet
- Romania
- Passkey
- File transfer appliances
- Federal Communications Commission (FCC)
- Election Interference
- Election
- BadRAM
- Zipcar
- United Nations (UN)
- Sailpoint
- Progress Software
- National Cyber Security Centre (NCSC)
- National cyber
- MOVEit
- Incident Response
- BT
- Uganda
- UEFI
- Operation Serengeti
- NATO
- National Health Service (NHS)
- Linux
- INC Ransomware
- Hybrid Warefare
- Healthcare
- Health
- Germany
- Central Bank
- Bootkit
- Board
- Blue Yonder
- Alder Hey
- Afripol
November 2024
November 2024
- “Wi-Fi”
- “Critical National Infrastructure (CNI)”
- Transportation Security Administration (TSA)
- Telematics
- Spotify
- Palo Alto Networks
- Open Source
- NIS
- GruesomeLarch
- GRU
- Fancy Bear
- Black Friday
- Akira
- Action Fraud
- 0ktapus
- Volt Typhoon
- Scaleable Vector Graphics (SVG)
- NATS
- D-Link
- Cyber-stalking
- Citrix
- Air Traffic Control (ATC)
- Winter Fuel Payment
- Sophos
- Small and Medium Business (SMB)
- Schneider Electric
- Rhysidia
- Okta
- Nokia
- Node Package Manager (NPM)
- Infostealer malware
- Infostealer
- Inactivity Reboot
- HPE
- Halburton
- FreeBSD
- DocuSign
- Cyber insurance
- Copyright infringement notice
- Colonial Pipeline
- Authentication bypass
- Authentication
- Aruba
- UnitedHealth Group
- UnitedHealth
- Strava
- Spring framework
- Resilience
- MoneyGram
- Interbank
- Generative AI (GenAI)
- Generative AI
- Financial Conduct Authority (FCA)
- Disney
- Disgruntled Employee
- Delta
- CyberPanel
- ATM
October 2024
October 2024
- “SecureWorks”
- Watermarking
- Water
- Unisys
- SolarWinds
- Software liabilities
- Securities and Exchange Commission (SEC)
- REvil
- Regulatory filings
- Mimecast
- Insurance backstop
- Hong Kong
- Data Use and Access Bill
- Data Protection and Digital Information Bill
- Data protection
- Cyber Essentials
- Consumer Financial Protection Bureau (CFPB)
- Consent
- Check Point
- Breach disclosure
- Avaya
- Zero-day vulnerability
- Security logs
- Responsibilities
- National Public Data
- Intel
- Gait recognition
- Deepfake
- CISO
- Biometrics
- Biometric
- Banking
- Authorised Push Payment (APP) Fraud
- Authorised Push Payment (APP)
- Authorised Push Payment
- Anonymous Sudan
- Anonymous
- Wiretap
- The Com
- Software supply chain
- Measurement
- Marriott International
- Marriott
- Kaspersky
- GoldenJackal
- GitLab
- Data broker
- Communication Assistance for Law Enforcement (CALEA)
- Board-level cyber
- Backdoor
- ADT
- White House
- T-Mobile
- Ray-Ban
- RackSpace
- Police Service of Northern Ireland (PSNI)
- Optigo Networks
- Operation Cronus
- Hallucination
- FIN7
- Federal Security Service (FSB)
- Facial recognition
- Evil Corp
- DrayTek
- Defend Forward
- Cyber strategy
September 2024
September 2024
- UltraAV
- Pango Group
- Network Rail
- Defacement
- Dark Web
- Cyber Resilience Act (EU)
- Cyber Operations
- CUPS
- Automotive
- Voice cloning
- Trump
- Transport for London (TfL)
- Temu
- Telegram
- Software quality
- SIM Swapping
- Service Now
- SecureBoot
- PKFail
- Mass-surveillance
- Israel
- Flax Tyhpoon
- Five dollar wrench
- Cyber-espionage
- Cyber deterrence
- Botnet
- Assurance
- Slim CD
- Side-loading
- Scams
- RT (Russia Today)
- Mustang Panda
- Mastercard
- ISC2
- Eye tracking
- EY
- Data centre
- Cyber workforce
- Android
- Yubikey
- Yubico
- US Navy
- Starlink
- Revival Hijack
- RAMBO
- Darktrace
- Content moderation
- Cicada3301
- BlackCat
- ALPHV
- Air Gap
- Satellite
- Peach Sandstorm
- Internet Service Provider (ISP)
- Intellectual Property
- Digital Services Act
August 2024
August 2024
- Social securtiy number
- Phishing
- Hack and leak
- Endpoint security
- Donald Trump
- Wormable
- Worm
- Windows
- Time
- Pwnie
- Geofence
- Business Email Compromise (BEC)
- “Data scraping”
- Laptop farm
- GDPR
- Dutch Data Protection Authority
- Delta Airlines
- Cyber power
- Biometric Information Privacy Act (BIPA)
- ServiceNow
- EvilProxy
- Evasive Panda
- Entrust
- Electoral Commission
July 2024
July 2024
- Concentration risk
- Accumulation Risk
- TicketMaster
- ShinyHunters
- SeigedSec
- Responsible disclosure
- RADIUS
- Public disclosure
- One-time passwords (OTP)
- One-time passwords
- Netgear
- Exim
- Dark patterns
- Blast-RADIUS
- APT40
- 5G
- Twilio
- Third party risk
- Smishing
- Remote Code Execution (RCE)
- Qualys
- OpenSSH
- Large Language Models (LLMs)
- Japan
- Huntress
- Evolve Bank & Trust
- Digital Transformation
- CocaPods
- Cobalt Strike
- Authy
- AI detection
June 2024
June 2024
- WikiLeaks
- TeamViewer
- Qilin
- Operation First Light
- NHS
- Julian Assange
- Indonesia
- HubSpot
- Health care
- Forta
- FIN9
- FileCatalyst
- Evolve Bank and Trust
- Crimea
- Crime
- Brain Cipher
- APT29
- Velvet Ant
- Serv-U
- Sellafield
- Poland
- Nuclear
- Medibank
- Child Sexual Exploitation Material (CSAM)
- Browser Extension
- Browser
- Adobe Commerce
- Adobe
- “Oktapus”
- UNC5537
- Golden SAML
- Conti
- Blackbaud
- Zyxel
- Tenable
- Recall
- Ticket Master
- Santander
- Misinformatoin
- Market consolidation
- Hudson Rock
May 2024
May 2024
- Wi-Fi Positioning System (WPS)
- Redaction
- Microsoft Recall
- Industrial Control System (ICS)
- SIEM
- Large Language Model (LLM)
- Ebury
- Data-control path
- BreachForums
- US cyber strategy
- TunnelVision
- Tetris
- Solar storm
- Rolling shutter
- Operation Cronos
- Networking
- Network routing
- GPS
- GhostStripe
- Farming
- Digital solidarity
- Balkanisation
- Autonomous Vehicles
- Proxyware
- Product Security and Telecommunications Infrastructure Act (2022)
- Known Exploited Vulerabilities (KEV)
- Jamming
- DBIR
- APT28
April 2024
April 2024
- Know Your Customer (KYC)
- Grindr
- Cyber Army of Russia
- ByteDance
- Attacker-in-the-Middle (AITM)
- Yahoo
- Cydea
- Cyber Assessment Framework
- US Cyber Command
- Truth Social
- Trade Unions
- Sisense
- Safeguarding
- Multi-party approvals
- Kobold Letters
- Hunt forward
- Deep fake
- Cyber Security Breaches Survey
- Communications Workers Union (CWU)
- Aslef
- “Storm-0558”
- XZ Utils
- UK Parliament
- Trustworthy Computing
- Trust
- SS7
- Identity theft
- Identity
- Honey trap
- Device Bound Session Credentials (DBSC)
- Cyber Safety Review Board (CSRB)
- Cyber Safety Review Board
- Cyber safety
- Cookies
- Coercion
- Advanced Persistent Threat (APT)
- Advanced
March 2024
March 2024
- MFA Fatigue
- Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)
- Corporate Espionage
- Unsaflok
- Trucks
- Saflok
- RFID
- Parliament
- Esports
- Electronic Logging Devices
- Dormakaba
- Door locks
- Disruption
- Data brokers
- Cyber-physical
- Cyber Security Longitudinal Survey
- Cyber flashing
- Cloud Security Architecture
- Cloud Security
- CEO
- AWS
- Atos
- Apex Legends
- Airbus
- AcidRain
- AcidPour
- Wi-Fi Jammers
- US Cyber Trust Mark
- Side channel
- Security labels
- McDonald’s
- Lessons Learned
- HIPAA
- France Travail
- eSIM
- Consent or Pay
- CCTV
- Airbnb
- SDLC
- JetBrains
- Internet Crime Report
- Exit scam
- Cisco WebEx
- SubdoMailing
- NSO Group
- NIST Cybersecurity Framework (CSF)
- Morris II
- Leap Day
- GPS Tagging
- GenAI
- Email security
- DNS
- ConPromptMized
February 2024
February 2024
- Wireless charing
- VoltSchemer
- Security debt
- Post-quantum computing (PQC)
- Opeation Cronus
- National Crime Agency (NCA)
- KeyTrap
- iMessage
- Encryption
- DNSSEC
- ConnectWise
- Zeus
- Turla
- Hospitals
- Crypto-wars
- Chatbot
- Air Canada
- Ransomware payments
- Flipper Zero
- DEF CON
- Ransowmare payments
- Proofpoint
- Moody’s
- Monero
- FTX
- Data breaches
- Cryptogram
- Credit rating
- Cloudflare
January 2024
January 2024
- Ring doorbell
- Ring
- National Security Agency (NSA)
- Hewlett Packard Enterprise (HPE)
- Australia
- PixieFail
- Password spraying
- Kyivstar
- Harms
- Gaza
- Colossus
- Sandworm
- Pulse Secure
- Market manipulation
- M9com
- Internet of Things (IoT)
- Internet of Things
- eSafety
- Cryptojacking
- Critical infrastructure
- Censorship
- Bitcoin
- AirDrop
- SWATting
- RIPE
- Radioactive Waste Management (RWM)
- Orrick
- Orange Spain
- npm
- NotPetya
- Merck
- LastPass
- BGP hijacking
December 2023
December 2023
- Triangulation
- RingGo
- ParkMobile
- Email Security Gateway (ESG)
- EasyPark Group
- Barracuda
- ARM
- “Qakbot”
- “Mobile Device Management (MDM)”
- Stolen Device Protection
- SSH (Protocol)
- Regulation
- Predatory Sparrow
- Porsche
- Payment Systems Regulator (PSR)
- MobileIron
- Mobile Device Management
- Isreal
- Interpol
- Federal Bureau of Investigation (FBI)
- Citrix Bleed
- Card skimming
- Breach notification
- Artificial Inteligence (AI)
- Ubiquiti
- TeamCity
- Perforce
- Password Manager
- National Grid
- Nari Technology
- Location tracking
- Hunters International
- Hive
- Geofence Warrants
- Cyber war
- Cox Media Group (CMG)
- Banking trojan
- AutoSpill
- Active Listening
- “Zero-click”
- Suspicious Activity Report (SAR)
- Rootkit
- Push Notifications
- Misinformation
- Mass Spying
- Insider Threat
- Cameo
- BLUFFS
- Binance
- Artifical Intellignce (AI)
- UEIF
- NXP
- NameDrop
- LogoFail
- Islamic Revolutionary Guard Corps (IGRC)
- Information Warefare
- Data extraction
- BIOS
November 2023
November 2023
- Russia Federal Security Service
- Real Estate
- Optus
- Nothing Chat
- LitterDrifter
- Legal sector
- Law firm
- Incident reporting
- Data retention
- Cyber Security Strategy
- CTS
- “DP World”
- Tactics
- Regulatory filling
- Port
- National Telecommunication Monitoring Centre (Bangladesh)
- Mirai
- Logistics
- Lawful Intercept
- Denmark
- Cyber sector
- “Industrial and Commcercial Bank of China (ICBC)”
- Veamm
- Legal privilege
- Law enforcement
- Incident Response (IR)
- Electronic Identification, Authentication and Trust Services (eIDAS)
- Electricity Distribution
- Certificates
- Boeing
- Allen & Overy
- Timothy Brown
- Solorigate
- RansomVC
- Leap seconds
- International Counter Ransomware Initiative (CRI)
- Find My
- Common Vulnerability Scoring Standard (CVSS)
- Bluetooth Low Energy (LE)
- AI Safety Summit
October 2023
October 2023
- “1Password”
- Unified Payments Interface (UPI)
- Roundcube
- PwC
- Online Safety Bill
- Octo Tempest
- IT Army
- India
- iLeakage
- Cyberwar
- BeyondTrust
- “International Criminal Court”
- “International Criminal Court (ICC)”
- “Hacktism”
- Trigona
- Ragnar Locker
- Keyword Warrants
- Joseph Sullivan
- Five Eyes
- Backups
- Rapid Reset
- MageCart
- Killnet
- Gonjeshke Darande (Predatory Sparrow)
- Equifax
- Catfishing
- Aonymous Sudan
- AON
- Red Cross
- Operationa Duck Hunt
- North Atlantic Treaty Organisation (NATO)
- Misconfiguration
- Lyca Mobile
- IronNet
- International Committee of the Red Cross (ICRC)
- Hacktivist
- Elliptic Curve Cryptography (ECC)
- Cyber-warfare
- Sony
- Redundancies
- National Cyber Security Alliance (NCSA)
- Mixin
- Microsoft Bing Chat
- KNP Logistics
- Knights of Old
- Google Bard
- Get Safe Online
- CyberAware
- Crypto-currency
September 2023
September 2023
- “UK-US Data Framework”
- “Splunk”
- “Funds Transfer Fraud (FTF)”
- “Data Transfer”
- “California Age-Appropriate Design Code Act (CAADCA)”
- “Save the Children”
- “Redfly”
- “Online Advertising”
- “Malvertising”
- “Facebook Messenger”
- “Caesars Entertainment”
- “BianLian”
- “Toyota”
- “Rome Statute”
- “Police Service Northern Ireland (PSNI)”
- “Common Vulnerability Scoring System (CVSS)”
- Pegasus (spyware)
- Nation-state
- “Operation Duck Hunt”
- Take down
- Qbot
- Malwarebytes
- Malware
August 2023
August 2023
- “SPHERE23”
- “Risk”
- “Malicious extensions”
- “Excel”
- “Cyber Security Sauna”
- “Budget”
- “Budgeting”
- “Representative test data”
- “FIDO2”
- “Data loss”
- “Cyber budgets”
- “Chief Information Security Officer (CISO)”
- “Automation”
- Quantum Cryptography
- Bots
- Zoom
- Viasat
- Rapid7
- Freedom of Information (FOI)
- Barracuda Networks
- Side-channel attacks
- Side channel attacks (SCA)
- Dynamic code loading (DCL)
- Corrective control
- Cloudzy
- California Privacy Protection Agency
- California Consumer Privacy Act
July 2023
July 2023
- TETRA
- Shadow IT
- Kids Online Safety Act
- Insecure Direct Object Reference (IDOR)
- Foreign Intelligence Surveillance Act (FISA)
- Clare O’Neil
- Cl0p
- Children’s Online Privacy Protection Rule (COPPA)
- Children and Teens Online Privacy Protection Act
- Security poverty line
- JumpCloud
- Safe Harbor
- Privacy Shield
- PoisonGPT
- Max Schrems
- EU-US Data Privacy Framework
- Decoupling
- Link Rot
- Digital Identity
- Counter-Espionage
- Wagner
- Verizon Data Breach Investigations Report
- US Supreme Court
- Splinternet
- Security and Exchange Commission (SEC)
- Password complexity
- Log4j
- Encrochat
- Cyberstalking
June 2023
June 2023
May 2023
May 2023
- Standard Contractual Clauses (SCCs)
- Micron
- Guam
- Fingerprint
- European Data Protection Board (EDPB)
- Diplomacy
- Data Protection Commission (DPC)
- BrutePrint
- Brute force
- Montana
- Data Protection and Digital Information (DPDI)
- App Store
- Snake
- Micro-Star International (MSI)
- European Union (EU)
- European Union
- Act of War
April 2023
April 2023
March 2023
March 2023
February 2023
February 2023
- US Department of Defense
- Competition
- Social engineering
- SMS
- Multi-factor Authentication (MFA)
- Multi-factor authentication
- Lancashire Police
- Industrial Control Systems (ICS)
- ICEFALL
- Disinformation
- Dashboards
- TrickBot
- Training data
- Exclu
- ESXiArgs
- Enchrochat
- Bing Chat
- An0m
- Threat modelling
- Threat model
- Simple Sabotage Field Manual
- Risk Analysis
- Rate limiting
- NCC Group
- Middle management
- JD Sports
- GPT-2
- Application Programming Interface (API)
- Account registration
January 2023
January 2023
December 2022
December 2022
- EternalBlue
- Epic Games
- Children’s Online Privacy Protection Act (COPPA)
- Windows Hardware Developer Program
- Supply-chain attack
- Internal API
- Inastrgam
- Digital signatures
- Commodities
- Passkeys
- Mercury IT
- Homomorphic Encryption
- Reuglation
- Network and Information Systems (NIS)
- Managed Security Service Provider (MSSP)
- Managed Detection and Response (MDR)
- Eufy
November 2022
November 2022
October 2022
October 2022
- UK Informtion Commissioner
- See Tickets
- Raspberry Robin
- Performance measurement
- Liz Truss
- Interserve Group
- Boardroom
- Authenticaiton
- Accountability
- Federal Office for Information Security (BSI)
- Workplace Surveillance
- Thermal imaging
- LockBit 3.0
- ProxyNotShell
- NetWalker
- Data Access Agreement (DAA)
- Bring Your Own Driver
- BlackByte
- Internet governance
- International Telecommunicaions Union (ITU)
- eBay
September 2022
September 2022
August 2022
August 2022
- UK Conservative Party
- Lloyd’s of Londond
- wiper
- Thames Water
- South Staffordshire PLC
- Seabogium
- Reconnaisance
- RECON
- Mailchimp
- Janet Jackson
- DigitalOcean
- Yanluowang
- Tornado Cash
- SpaceX
- Personal accounts
- NHS 111
- Advanced Computer Software Group
- Traffic Light Protocol
- SunBurst
- Reading list
- Election security
July 2022
July 2022
- Southern Co-Op
- protestware
- Opportunity cost
- Microsoft Defender
- Facewatch
- Electric Vehicles (EVs)
- Actoin bias
- Risk aggregation
- FaceID
- Data exfiltration
- Cloud misconfiguration
- Climate change
- Backdoors
- Alibaba
- Office of Personnel Management (OPM)
- Log4Shell
- State surveillance
- Shanghai National Police (SHGA)
- Attack surface
- Safety
- Kinetic cyber
- Cyber-attack
- BellTroX
June 2022
June 2022
- Targeted advertising
- Reproductive rights
- Infosecurity Europe
- Infosec2022
- Formula 1
- Environmental, Social and Governance (ESG)
- Cyber Warefare
- Cyber Incident Phoneline
- Process
- People, Process, Technology
- Health and Location Data Protection Act
- Mandiant
- Known Exploited Vulnerabilities (KEV)
- Follina
- Computer Fraud and Abuse Act (CFAA)
- Website defacement
- Privacy legislation
- Manfuacturing
- Digital Shadows
- Confluence
- Atlassian
May 2022
May 2022
April 2022
April 2022
March 2022
March 2022
- Risk concentration
- Key Risk Indicators
- Key Performance Indicators
- IC3
- Satellite communications (satcom)
- Online Safety Bill (UK)
- Online Safety Bill (UK legislation)
- Initial Access Broker (IAB)
- General Data Protection Regulations (GDPR)
- Exotic Lilly
- Information warfare
- Cyber-crime
- Conti Ransomware
- Conti (ransomware gang)
- APT41
February 2022
February 2022
January 2022
January 2022
- Let’s Encrypt
- Balrusian Railways
- No Place To Hide
- Home Office (UK)
- Crypto.com
- Sodinokibi
- Security Programme
- Security Obstructionism (SecObs)
- Risk identification
- Democratic People’s Republic of Korea (DPRK)
- UK Information Commissioner
- Positive Security
- NortonLifeLock
- Google Docs
- Crypto-mining
- Predicitions
December 2021
December 2021
November 2021
November 2021
- Tardigrade
- Nigeria
- Diversity
- Biomanfuacturing
- Rowhammer
- Private Key Infrastructure (PKI)
- National Security and Investment Act 2021
- Monzo
- Emotet
- Vulnerability disclosure
- Offensive security tools
- National Transport Safety Board (NTSB)
- Federal Bureuax of Investigation (FBI)
- Ethics
- Cyber defence
- Client-Side Scanning (CSS)
- Unicode
- Trojan Source
- Personal Information Privacy Law (PIPL)
October 2021
October 2021
September 2021
September 2021
August 2021
August 2021
- Surveillance state
- Data protection regulation
- Cosmos DB
- Securities Exchange Commission (SEC)
- Pearson
- Moral outrage
- Investor relations
- Machine learning (ML)
- Machine learning
- iCloud Photos
- iCloud
- Doxxing
- Cyber Runway
- Code poisoning
- Chiled sexual abuse
- Trusted Platform Module (TPM)
- Cyber offense
- Biometric authentication
- Spoofing
- PrintNightmare
- President Biden
- AIS
July 2021
July 2021
- Risk management
- Hafnium
- Data Sovereignty
- APT 40
- APT 31
- Windows Print Spooler
- Online anonymity
- Leaks
- Information Comissioner’s Office (ICO)
- Great Firewall of China
- Great Firewall
- Random Number Generators
- Kaspersky Password Manager (KPM)
- John Deere
- CVE-2021-34527
- Taskforce on Innovation, Growth and Regulatory Reform (TIGRR)
June 2021
June 2021
May 2021
May 2021
- U.S. Military
- U.K. National Cyber Force (NCF)
- Privacy defaults
- Operation Venetic
- Nuclear weapons
- NHS Digital
- Cybercrime economics
- Amazon Sidewalk
- Technology detection dogs
- Health Services Executive (HSE)
- Colonial Pipelines
- Axa
- Asia
- West Midlands Trains
- Security engagement
- Security awareness
- Public exploits
- Phishing simulation
- Information Security Maturity Report
- DBIR 2021
- ClubCISO
- 10 Steps to Cyber Security
- Royal United Services Institute (RUSI)
- Moriya
- Energy networks
- Command and Control (C2)
- BAE Systems
- Reputation
- Physical threat
- Operational resiliance
- Metropolitan Police Department (Washington DC)
- Law enforcement takedown
- Confidential informant
- Canada
- Boris Johnson
- Beavers
- Babuk
April 2021
April 2021
March 2021
March 2021
February 2021
February 2021
- Solorwinds
- Initial Access Brokers (IABs)
- Bad IR
- Accellion
- Security vs Usability
- Exaramel
- European Commission
- EU-UK Data protection adequacy
- Citibank
- Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI)
- The Long Hack
- The Big Hack
- Supermicro
- Package managers
- Isis
- Dependency confusion
- Bloomberg
- Trustwave
- SpamCop
- Interoperability
- Cleaview AI
- Cisco Talos
January 2021
January 2021
December 2020
December 2020
November 2020
November 2020
- Vishing
- UK National Cyber Force (NCF)
- UK National Cyber Force
- Sopra Steria
- Public health
- Home Depot
- Cyber public health
- USSOCCOM
- Speculative Execution
- Regional Comprehensive Economic Partnership (RCEP)
- Microsoft Pluton
- Meltdown
- Association of South-East Asian Nations (ASEAN)
- Tim Berners-Lee
- Password Strength
- Nutrition labels
- Inrupt
- Cyber skills gap
- Voice over IP (VOIP)
- United States of America (USA)
- UK Information Commissioner’s Office (ICO)
- Regulatory penalty
- Huawei
- Clean Network Program
October 2020
October 2020
September 2020
September 2020
- YOLOsec
- Value generation
- Security value
- Security strategy
- Pseudo-national threat
- Nationalism
- FOMOsec
- Commodity controls
- Windows Server
- NetLogon
- Experian
- National cyber capability
- Global Initiative on Data Security
- EU-US Personal data transfers
- Data Protection Commission (Ireland)
- Vulnerability Disclosure Policy (VDP)
- Security spending
- Security Spend
- Secure Cyber Risk Aggregation and Measurement (SCRAM)
- Quantification
- Personal liability
- Massachusetts Institute of Technology (MIT)
- Hiscox
- Gartner
- Fiduciary responsibility
- Cyber Readiness Report
- CEO liability
August 2020
August 2020
- Security budgeting
- NZX (New Zealand Stock Exchange)
- JML (Joiners-Movers-Leavers)
- FBI (Federal Bureaux of Investigation)
- DDOS (Distributed Denial of Service)
- Threat Intelligence
- Mailto
- fraudulent data request
- Cover-up
- ReVoLTE
- Prediction
- Ofqual
- MITRE Shield
- Estimation
- Automated decision-making
- Accuracy
- 4G LTE
- 2020 Exam Results
- Satellite Internet
- Liam Fox
- Energy markets
- Disinformation campaigns
- Bug bounties
- Black Hat
- No More Ransom Project
- GRUB
- Garmin
- Cyber-sanctions
- CWT Travel
- Boothole
July 2020
July 2020
- WastedLocker
- Test & Trace
- Sport
- Deepfake audio
- Data protection impact assessment (DPIA)
- Windows DNS
- SigRed
- Schrems II
- SAP NetWeaver
- Perfect 10 Vulnerabilities
- EU-US Privacy Shield
- Digital risk
- Digital divide
- 5G Mobile Networks
- OAuth
- Internet Balkanisation
- Hong Kong national security law
- Cosmic Lynx
- Natanz
- Mass hacking
- Internet Archive
- Efficiency vs Resilience
- EARN-IT Act
- Barclays
June 2020
June 2020
- Netsentinel
- Maersk
- Lawful Access to Encrypted Data Act
- Google Analytics
- Exchange
- Distributed Denial of Secrets
- Copy and paste
- Browser cache
- Blueleaks
- Vault 7 Leaks
- Treck
- South Africa Postbank
- Public Key Infrastructure (PKI)
- Payment cards
- Like-farming
- Copy-paste compromises
- Central Intelligence Agency (CIA)
- Central Intelligence Agency
- Australia Cyber Security Centre (ACSC)
- Stalkerware
- Risk Avoidance
- Private Investigators
- Platform abuse
- Lawful hacking
- Hack-for-hire
- Dark Basin (aka Snowstorm)
- Citizen Lab
- Child exploitation
- Babylon Health
- REvil (Sodinokibi)
- Password stats
- Maze Group
- Cybercrime business model
- Cyber security spending
May 2020
May 2020
- University of Cambridge
- Threat Metrix
- Octopus Scanner
- Mandient
- GitHub
- EasyJet
- DDoS-as-a-Service
- Winnti
- Virtualisation
- Collection 1
- CyberTalks
- ThunderSpy
- Thunderbolt
- Risk quantification
- Ransomware costs
- NHSX
- Market Pricing
- Marcus Hutchins (MalwareTech)
- Malware analysis
- High-performance computing (HPC)
- Hedging
- Elexon
- CyberHedge
- Roblox
- Password Reuse
- Ohio (US State)
- Grubman Shire Meiselas & Sacks (GSM)
- Computer gaming
- Video Conferencing (VC)
- Video Conferencing
- Sheffield City Council
- Office 365
- Local Government
- Diversity and Inclusivity
- Antivirus (AV)
April 2020
April 2020
- ZecOps
- Web shells
- Vulnerability identification
- UK Ministry of Defence
- Surveillance programmes
- Mail.app
- IBM Data Risk Manager
- Cloud Hopper
- SkyWrapper
- Pastebin
- North Rhine-Westphalia
- Department of Defense (US)
- Compliance risk
- AttackerKB
- AiR-ViBeR
- Travelex
- Rostelecom
- ransom payments
- cyber economics
- asymmetric threat
- TheyHelpYou
- Community Hubs
- Security Watercooler
- Morrisons
- Amazon Detective
March 2020
March 2020
- Third-sector data protection
- Schools & Education
- Phineas Fisher
- FSB
- DNS Hijacks
- Dharma
- Chubb
- Booz Allen Hamilton
- VPN
- Remote Working
- Remote Access
- VPN Security
- Securing Virtual Meetings
- Privacy vs Surveillance
- Pi-Hole
- Phased Array
- Pale Blue Dot
- Money Mules
- DuckDuckGo
- DNS Blocklist
- Whisper
- U.S. Cyber Strategy
- SMB
- Cyberspace Solarium Commission
- Avast
- US EARN IT
- Smart cameras
- Loyalty Cards
- Location Privacy
- LLHS
- INsecurity
- Certificate Scam
- Security Education
- IoT