Editor
27
Mar
2025

Guarding against grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a…

NPM
27
Mar
2025

Infostealer campaign compromises 10 npm packages, targets devs

Ten npm packages were suddenly updated with malicious code yesterday to steal environment variables and other sensitive data from developers’…

Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks
27
Mar
2025

Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks

Mar 26, 2025Ravie LakshmananBrowser Security / Vulnerability Google has released out-of-band fixes to address a high-severity security flaw in its…

Public Accounts Committee calls out legacy IT
27
Mar
2025

Public Accounts Committee calls out legacy IT

The Public Accounts Committee (PAC) has urged the government to fix legacy IT issues if it wants to succeed with…

DAFF recruiting new CIO to address 'compounding' IT debt
27
Mar
2025

DAFF recruiting new CIO to address ‘compounding’ IT debt – Cloud – Hardware – Networking – Security – Software

The Department of Agriculture, Fisheries and Forestry (DAFF) has begun searching for a new CIO following the departure of Mark…

27
Mar
2025

Hive Five 203 – How To Live an Epic Life

Obsidian update, I’ve started using the plus, minus, next method in my daily note. Then, use Dataview to roll that…

How My Projects Fit Together
27
Mar
2025

How My Projects Fit Together

When people look at the various projects I’ve put out over the last year, they often ask which is the…

[tl;dr sec] #256 - AI SOC Analyst, Detection Engineering, How to Ransomware in AWS
27
Mar
2025

[tl;dr sec] #256 – AI SOC Analyst, Detection Engineering, How to Ransomware in AWS

NVIDIA’s AI SOC analyst you can speak to, embracing TDD and detection as code, tips on how 2 ransomware I…

Editor
27
Mar
2025

Threat actors exploit zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from…

China hacker
27
Mar
2025

Chinese FamousSparrow hackers deploy upgraded malware in attacks

A China-linked cyberespionage group known as ‘FamousSparrow’ was observed using a new modular version of its signature backdoor ‘SparrowDoor’ against a US-based…

Using Automated Pentesting to Build Resilience
27
Mar
2025

Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…”— Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The…

Military AI caught in tension between speed and control
27
Mar
2025

Military AI caught in tension between speed and control

Military planners and industry figures say artificial intelligence (AI) can unlock back-office efficiency for the UK’s armed forces and help…