My Courses
-

File security risks increasing due to insider threats, malware, and AI
Breaches related to file access are increasingly common, leading to significant financial repercussions for many organisations. Over the past two years, numerous companies have experienced…
-

GhostRedirector compromises Windows servers utilizing Rungan backdoor and Gamshen IIS module
Cybersecurity researchers have uncovered a previously undocumented threat cluster known as GhostRedirector, which has compromised at least 65 Windows servers, primarily located in Brazil, Thailand,…
-

Russian cyberespionage group APT28 targets NATO member firms with Outlook “NotDoor” backdoor
The Russian state-sponsored hacking group known as APT28 has been linked to a new Microsoft Outlook backdoor called NotDoor, which has been used in attacks…
-

USA and allies advocating Software Bill of Materials (SBOMs)
The adoption of Software Bill of Materials (SBOM) is set to significantly enhance software supply chain security, thereby reducing risks and costs associated with vulnerabilities….
-

DDoS attacks act as tools for political leverage and chaos
In the first half of 2025, there were 8,062,971 DDoS attacks globally, with the EMEA region experiencing the highest volume at 3.2 million attacks, according…
-

The US Cybersecurity Agency has highlighted a vulnerability in Wi-Fi range extenders that is currently being exploited.
The Cybersecurity and Infrastructure Security Agency (CISA) has identified a significant vulnerability in the TP-Link TL-WA855RE Wi-Fi range extender, which allows attackers to reset and…
-

Malicious actors using HexStrike AI to create Citrix exploits
Threat actors are attempting to exploit a newly released artificial intelligence (AI) offensive security tool called HexStrike AI, which is designed to automate reconnaissance and…
-

Cloudflare successfully thwarts unprecedented DDoS attack
A recent wave of Distributed Denial of Service (DDoS) attacks persisted for several weeks, characterised by a massive User Datagram Protocol (UDP) flood. This unprecedented…
-

How a background in gaming can benefit a career in cybersecurity
Many people may not realise that playing video games can contribute to a career in cybersecurity. The skills acquired through gaming, although seemingly unrelated at…


