Making Sense Of The Chinese Attack On US Critical Infrastructure

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

In a recent cyber attack that has raised concerns among intelligence officials and researchers around the world, a hacking group

Read more

An Essential Guide to Understanding, Reporting, and Combatting Digital Threats

The face of cybercrime can be as mutable as the technology it exploits, adopting myriad forms and guises to catch

Read more

Cybersecurity on a Small Business Budget: Adapting to the Modern Threat Landscape

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

As a small business owner, you might feel a bit like David in a world of Goliaths, as they say,

Read more

Safely Integrating Large Language Models (LLMs) into Your Products: A White Hats Perspective

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

With the rise of AI startups and the availability of novel AI tools, particularly Large Language Models (LLMs), have created

Read more

Critical Security Vulnerability Uncovered in Essential Addons for Elementor WordPress Plugin CVE-2023-32243

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

A recently disclosed security vulnerability in the widely used WordPress plugin, Essential Addons for Elementor, has raised concerns about potential

Read more

Busting the Myths: NCSC and ICO Expose the Truth About Incident Reporting

In an unprecedented collaboration, the National Cyber Security Centre (NCSC) and Information Commissioner’s Office (ICO) have united to issue a

Read more

UK’s Leading Cybersecurity Agency Urges Business Leaders to Take Cyber Risks Seriously

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The National Cyber Security Centre (NCSC) of the UK has released an updated Cyber Security Board Toolkit and is urging

Read more

Twitter discontinues text message two-factor authentication for non-Blue subscribers

In a controversioal move, twitter has recently announced that it is discontinuing the use of text message two-factor authentication for all users, except for those who subscribe to Twitter Blue. This means that users who have relied on SMS-based two-factor authentication to protect their accounts will now need to switch…

Read more

A Lesson in Privacy: The ChatGPT Bug and Its Implications for AI Conversations

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The world of AI-powered conversation platforms has been rocked by a recent incident involving ChatGPT, a popular AI chatbot developed

Read more

Woo Payments Critical Vulnerability: What You Need to Know & How to Protect Your Online Store

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

WooCommerce on the 23rd of March announced security updates to address a critical vulnerability in its WooCommerce Payments plugin, which

Read more