Customised Cobalt Strike beacon employed in attacks

An unofficial hacker-built Linux version of a Cobalt Strike beacon has been identified by cybersecurity researchers being actively deployed in attacks aimed at international organisations. The threat operator is behind the development remains unknown, but experts have confirmed that the version of Cobalt Strike has been custom-built from the ground up. Corruption of a useful […]

Read More… from Customised Cobalt Strike beacon employed in attacks

How privileged access management can help local councils

Local council systems and data stores contain a vast amount of confidential information on data subjects who live within a borough or county. This presents local authorities with a considerable responsibility to protect the members of its community and the data it retains on them. […]

Read More… from How privileged access management can help local councils

Core cybersecurity steps every local government must take

While enterprises and world governments have long been targets of cybercriminals, local authorities are fast becoming a sought-after victim for attacks. Often lacking the same defensive capabilities, training for personnel and security budgets available to larger entities, they present a more vulnerable – and therefore more accessible – target. […]

Read More… from Core cybersecurity steps every local government must take

International Programmers Day – how programming affects cybersecurity

Each year, International Programmers Day is celebrated around the world on the 256th day of the year. The numeral 256 was selected as in terms of distinct values, it’s the number that can be represented by a byte, which is a well-known value to any programmer. Proposed by a Russian software firm’s employees back in […]

Read More… from International Programmers Day – how programming affects cybersecurity