Stealing your data is a priority for threat actors

There is a highly completive market evolving to provide threat actors with malware that evades detection and then as quietly as possible exfiltrate sensitive data from the compromised system. This can include, cookies, session cookies, credentials, credit card and crypto-wallet data etc. The new info-stealing malware operations to watch out …

Where am I today?

Edinburgh Napier University at The 6th International Conference on Big Data, Cybersecurity & Critical Infrastructure – not the snappiest of titles but it should be a good day. With the launch of our Security Operations Centre coming up I am particularly interested in the session that covers how a SOC …