❌

Normal view

How to Avoid Holiday Shopping Scams (From a Former Cyber Detective)

11 December 2025 at 16:53

Christmas is the time where we allow our imaginations to run wild, it’s the season of goodwill, high spirits and Christmas joy. However, cybercriminals don’t take holidays. We still have to be on our guard, and question what is real and what is not. Common Holiday Scams Fake Online Stores Around this time of year, […]

The post How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) appeared first on Heimdal Security Blog.

β€˜Mortified’ OBR chair hopes inquiry into budget leak will report next week

Reuters news agency says it obtained document after visiting URL it predicted file would be uploaded to

The chair of the Office for Budget Responsibility has said he felt mortified by the early release of its budget forecasts as the watchdog launched a rapid inquiry into how it had β€œinadvertently made it possible” to see the documents.

Richard Hughes said he had written to the chancellor, Rachel Reeves, and the chair of the Treasury select committee, Meg Hillier, to apologise.

Continue reading...

Β© Photograph: Kirsty O’Connor/Treasury

Β© Photograph: Kirsty O’Connor/Treasury

Β© Photograph: Kirsty O’Connor/Treasury

What is Managed ITDR? Key Definitions, Features, and Benefits

4 November 2025 at 16:50

Key takeaways: MITDR explained: Managed ITDR combines identity threat detection with expert-led response. Why it matters: Get better protection and lower costs without building a full in-house team. What to look for: Prioritize behavioral monitoring, real-time response, and expert oversight You’ve got the ITDR solution. That’s a good step towards effective account and identity-based threat […]

The post What is Managed ITDR? Key Definitions, Features, and Benefits appeared first on Heimdal Security Blog.

Cybersecurity Has a Motivation Problem

28 October 2025 at 14:29

I’ve worked in cybersecurity long enough to see that our biggest challenge isn’t a technical one, it’s motivational. We can build the strongest firewalls, design the smartest detection systems, and run endless awareness campaigns, but none of it matters if people don’t want to care. That’s the uncomfortable truth; cyber security has a motivation problem. […]

The post Cybersecurity Has a Motivation Problem appeared first on Heimdal Security Blog.

Techno Security & Digital Forensics Conference: October 27-29, 2025

1 October 2025 at 06:47
Hi everyone! I partnered withΒ Techno Security & Digital Forensics ConferenceΒ as anΒ Industry Supporter. The West edition of the Techno Security & Digital Forensics Conference will take place October 27-29, 2025 at the Town & Country...

Starmer to unveil digital ID cards in plan set to ignite civil liberties row

β€˜Brit card’ already facing opposition from privacy campaigners as government looks for ways to tackle illegal immigration

All working adults will need digital ID cards under plans to be announced by Keir Starmer, in a move that will spark a battle with civil liberties campaigners.

The prime minister will set out the measures on Friday at a conference on how progressive politicians can tackle the problems facing the UK, including addressing voter concerns around immigration.

Continue reading...

Β© Photograph: Alberto Pezzali/AP

Β© Photograph: Alberto Pezzali/AP

Β© Photograph: Alberto Pezzali/AP

Digital ID cards: a versatile and useful tool or a worrying cybersecurity risk?

As Keir Starmer aims to revive ID card system first proposed by Tony Blair, we look at the arguments for and against

It is 21 years since Tony Blair’s government made proposals for an ID card system to tackle illegal working and immigration, and to make it more convenient for the public to access services.

The same issues are on the agenda again as Keir Starmer revives what became one of New Labour’s most controversial policies. He is about to find out if he can defeat the argument that David Cameron’s Conservatives made before scrapping it. They said the ID card approach to personal privacy was β€œthe worst of all worlds – intrusive, ineffective and enormously expensive”.

Continue reading...

Β© Photograph: Amer Ghazzal/Shutterstock

Β© Photograph: Amer Ghazzal/Shutterstock

Β© Photograph: Amer Ghazzal/Shutterstock

Offline Memory Forensics With Volatility

Volatility is a memory forensics tool that can pull SAM hashes from a vmem file. These hashes can be used to escalate from a local user or no user to a domain user leading to further compromise.

The post Offline Memory Forensics With Volatility appeared first on Black Hills Information Security, Inc..

Free & Affordable Training News Monthly: Oct – Nov, 2024

11 November 2024 at 22:14
The following contains newly released Digital Forensics, Incident Response, Malware Analysis and OSINT training and tools from October, as well as upcoming live online training and events for November. Like theΒ Free & Affordable Training...

Webcast: Attack Tactics 7 – The Logs You Are Looking For

Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_AttackTactics7LogsYouAreLookingFor.pdf So we went through an attack in the BHIS Webcast, β€œAttack Tactics 5! Zero to Hero Attack.” Then we went through […]

The post Webcast: Attack Tactics 7 – The Logs You Are Looking For appeared first on Black Hills Information Security, Inc..

WEBCAST: Attack Tactics 3

John Strand// For this next installment of our Attack Tactics webcast series, John Strand looks at an environment that had no Active Directory. This is odd, but it’s becoming more […]

The post WEBCAST: Attack Tactics 3 appeared first on Black Hills Information Security, Inc..

❌