Category: Cybersecurity

Cybersecurity

Log4j: exploit attempts from all angles, including DMARC reports

Randal Pinto

As part of our own systems to ensure that we were not affected by the Log4j vulnerability, we at Red Sift spotted another creative exploit attempt...Continue Reading: Log4j: exploit attempts from all angles, including DMARC reports

Read more
Cybersecurity

Two Factor What? Everything you need to know about Two Factor Authentication…

Gino Coquis

Passwords are vulnerable. And every time a B2C company is hacked, there’s a high chance that your login details have been compromised and will soon be available for criminals to purchase on the dark web. That’s where Two Factor Authentication comes in...Continue Reading: Two Factor What? Everything you need to know about Two Factor…

Read more
Coronavirus

Last Christmas, I gave you my heart, my bank codes and my…

Faisal Misle

Three common phishing scams and the practical steps you can take to remain protected and not get caught out over the Christmas holiday season...Continue Reading: Last Christmas, I gave you my heart, my bank codes and my online identity

Read more
Cybersecurity

Red Sift and the Royal Marines: A Radical Idea?

Tom Patrick

The military can learn from a growth mindset and should work on providing learning experiences for service personnel that develops this approach...Continue Reading: Red Sift and the Royal Marines: A Radical Idea?

Read more
Cybersecurity

Webinar: Red Sift & Macfarlanes – How the cyber threat terrain dictates…

Harry Stephens

A webinar with Macfarlanes legal practice explaining what proactive steps your legal firm can take to prevent a cyber attack. ...Continue Reading: Webinar: Red Sift & Macfarlanes – How the cyber threat terrain dictates decision making for law firms

Read more
Cybersecurity

Oxidised eBPF II: Taming LLVM

alessandro

Rust supports a large number of target platforms, but BPF is not one of them yet. Therefore in order to compile for the BPF virtual machine, cargo-bpf needs to implement some ad-hoc build logic...Continue Reading: Oxidised eBPF II: Taming LLVM

Read more