UK’s Leading Cybersecurity Agency Urges Business Leaders to Take Cyber Risks Seriously

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The National Cyber Security Centre (NCSC) of the UK has released an updated Cyber Security Board Toolkit and is urging

Read more

HTTP Fundamentals: Understanding the Basics of Web Communication

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

HTTP, or Hypertext Transfer Protocol, is a cornerstone of web applications, enabling the exchange of data over the internet. As

Read more

Email hijackers con businesses out of food as well as money

Just your average information security researcher from Delaware US.

The FBI and other government agencies have warned that cybercriminals have begun using spoofed emails to steal shipments of real

Read more

The Top Hacks and Breaches of 2022, Ranked

Just your average information security researcher from Delaware US.

Folks, it’s officially that time of year. Yes, the time has come to rank the greatest (read: worst, most terrible,

Read more

LastPass Suffers 2nd Security Breach Of The Year; Exposing Some Customer’s Information

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Popular password-management firm LastPass announced that it is looking into a second security issue in which hackers gained access to

Read more

Online disclosure of 5+ million Twitter users’ stolen information

Just your average information security researcher from Delaware US.

An API flaw that was patched in January allowed for the theft of over 5.4 million Twitter user records that

Read more

WATCH: Top 5 CyberSecurity Trends To Expect In 2023

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Cybersecurity is a fast-evolving area. Here, we look at the most important trends to watch out for in 2023, including

Read more

Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]

Just your average information security researcher from Delaware US.

In this video, you will learn how to footprint firewalls on a target. This lesson comes from Module 1, so

Read more

Brute-Forcing Two-Factor Authentication | Exploiting Authentication and Access Control Mechanisms with Burp Suite [FREE COURSE CONTENT]

Just your average information security researcher from Delaware US.

In this video tutorial, you will see how to bypass multi-factor authentication with brute-force attacks. It is a part of

Read more

Cyber Today: Crypto Winter comes for FTX, oil and gas flow control vulnerability, images hide malware in PyPI

Just your average information security researcher from Delaware US.

Crypto Winter comes for FTX Earlier this week, crypto exchange Binance signed a letter of intent to acquire its rival

Read more