Making Sense Of The Chinese Attack On US Critical Infrastructure

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

In a recent cyber attack that has raised concerns among intelligence officials and researchers around the world, a hacking group

Read more

The Vital Importance of Regulations, Guidance, and Best Practices for Application Security

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

In our everly increasing, interconnected world, the security of applications is of utmost importance. Cyber threats are constantly evolving, targeting

Read more

pfBlockerNG 2.1.4_26 – (RCE) Remote Code Execution

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect
Read more

Meta issues a warning about the continued use of spyware targeting users of social media

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Facebook’s owner claims that businesses are adjusting and modifying their strategies in response to attempts to halt operations. Because surveillance-for-hire businesses continue to adapt and shift strategies in the face of attempts to shut down their capabilities,

Read more

Microsoft discovers Windows/Linux botnet used in DDoS attacks

Microsoft researchers have found a hybrid Windows-Linux botnet that assaults other platforms with distributed denial-of-service attacks and uses a highly

Read more

Customers are urged by Fortinet to address actively exploited FortiOS SSL-VPN flaw

An actively exploited FortiOS SSL-VPN weakness that would have allowed a remote, unauthenticated attacker to run arbitrary code on devices

Read more

CommonSpirit says 623K patients are affected by the data compromise

623,774 patients’ personal information were exposed as a result of the security incident that occurred in October, according to CommonSpirit

Read more

UK detains 5 people for supplying questionable point-of-sale software

The use of “electronic sales suppression software,” which are programmes that misrepresent point-of-sale data to assist businesses in avoiding paying

Read more

Experts developed a method to bypass multiple companies’ web application firewalls (WAF)

Researchers at the industrial and IoT cybersecurity company Claroty developed an attack method for getting past the web application firewalls (WAF) of a number of top manufacturers The method was found while working on the wireless device management platform of Cambium Networks for unrelated research. A

Read more

Microsoft PlayReady security research

Microsoft PlayReady is one of the key technologies used by PayTV industry and OTT platforms for Digital Rights Management and

Read more