
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

We know what you’re thinking. Should the word “beachhead” be “breachhead”?

We strip away the hype from the facts regarding AI and malware.


Why “Code Red”? What is “Salt Typhoon”? Does it matter?

We tend to focus so much on external cybersecurity threats that we forget about insiders.

0-click, 0-day, Oh dear! What you need to know, and what you can do right now.

“That which we call a rose/By any other name would smell as sweet.” But what about cyberthreats and cybercriminals?

Cyberattacks in 2024 confirmed many of the predicted cybersecurity trends. The year also highlighted new risk vectors due to AI and more sophisticated attack methods.

In truth, the term “investment scam” is probably the clearest and most useful name.

The US has just announced a Cyber Trust Mark logo for connected consumer devices.

There’s an ever-increasing cost in collecting more and more data just in case. So why do it?

Critical infrastructure organizations have seen a swell of attacks in the past few years. We examine why.


We explore how AI-enabled attack vectors target consumers, their organizational impact, and how to counter them.

MDM is short or “mobile device manangement.” What does that really mean, and what is it really for?

Ever wondered what’s so mean about Greenwich Mean Time? (And other fascinating facts!)

We know what you’re thinking. Should the word “beachhead” be “breachhead”?

We strip away the hype from the facts regarding AI and malware.

Why “Code Red”? What is “Salt Typhoon”? Does it matter?
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

We tend to focus so much on external cybersecurity threats that we forget about insiders.

0-click, 0-day, Oh dear! What you need to know, and what you can do right now.

“That which we call a rose/By any other name would smell as sweet.” But what about cyberthreats and cybercriminals?


Cyberattacks in 2024 confirmed many of the predicted cybersecurity trends. The year also highlighted new risk vectors due to AI and more sophisticated attack methods.




Critical infrastructure organizations have seen a swell of attacks in the past few years. We examine why.

We explore how AI-enabled attack vectors target consumers, their organizational impact, and how to counter them.

MDM is short or “mobile device manangement.” What does that really mean, and what is it really for?

Ever wondered what’s so mean about Greenwich Mean Time? (And other fascinating facts!)


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






