Similar Posts
CISA: UAParser.js Malware Discovered in the NPM Library
ByJackyIn the world of software development, the use of third-party packages and libraries is standard practice. These packages can help developers save time and resources by providing pre-built functionalities that can be easily integrated into…
Honouring Our Reservists: Balancing Civilian Life and Military Duty
Being a Reservist requires a special kind of person. Answering the call to serve is not a path everyone takes, but military reservists make up approximately one-fifth of our Armed Forces personnel and play an…
What makes a Good Incident Response Team?
ByJackyA cybersecurity incident response team (also known as CSIRT) is a team of cybersecurity experts available to deal with an incident occurring in an organisation. The team can be either internal or external, this depends on the nature of the incident and whether the team is equipped to deal with it effectively. Â
NOBELIUM Phishing Campaign | Sapphire
ByJackyOn May 27th, the Microsoft Threat Intelligence Centre (MSTIC) announced that ‘NOBELIUM’, the threat actor behind the SolarWinds compromise, had instigated another attack in the form of a persistent and evolving phishing campaign. Conducted in increasingly complex stages, this campaign has been active since January 2021. This is since the MSTIC first became aware of the operation.
What Is Metasploit? The Penetration Testing Framework
ByJackyCyberattacks are getting more complex, common, and devastating. Businesses must take preventative measures to protect their data and networks against cyberattacks. This is where Metasploit comes in: a robust open-source framework created to help detect…
Syslog Format: How it Works and Other Details
ByJackyMuch of today’s log management is still done using Syslog, which has roots in the 80s and was used without authoritative published specifications. Of course, it is also one of the most versatile tools that…

