Skip to main content

CND News and Blog

Scammers. Societies bottom-feeders.

Scamming is sadly a daily risk whilst navigating cyberspace. I wrote almost exactly 3 years ago in different post about a similar postal scam, masquerading as the Post Office asking for a small missed delivery fee (URL). Well this week it happened again to a family member who started to fall for it, fortunately they stopped but ...

0
  223 Hits
  0 Comments

Is Hacktivism a Threat?

In today's modern world, the risk of cyber threats have increased significantly. With 5.16 billion people globally using the internet, you can understand how the use of hacktivism has increased The question we are asking today, is hacktivism a threat and what is it's impact on everyday society? In today's blog, we will explore this question further...

0
  223 Hits
  0 Comments

What is a Hacktivist?

There is no doubt you have heard the word 'hacker' in recent years, but are you familiar with the word hacktivist and what this means? Today we are going to explore what is a hacktivist, what is their purpose, why they perform some of their acts and what the difference is between hackers and hacktivists.  What is a simple definition of hacktiv...

0
  575 Hits
  0 Comments

RAF Halton: Leadership Experience

 As Gold ERS holders, we are lucky to have access to unique opportunities. In Summer 2023 CND were invited to attend the RAF Halton 'Employer Engagement Management and Leadership Experience'. This was a national event with over 50 participants from a variety of industries, taking part. Upon arrival, on a rather drizzly day the attendees were s...

0
  367 Hits
  0 Comments

CND Visit the Defence Academy at Shrivenham

During Summer 2023, members of the CND team had the privilege of attending the Defence Academy in Shrivenham. The aim of the visit was for members from private sector organisations and businesses who employ or sponsor RFCA personnel to view the facilities and receive an introduction to the purpose and function of the Defence Academy, arranged by We...

0
  332 Hits
  0 Comments
radar Cyber Threat Intelligence, or the Radar Page

About the Radar Page and Vulnerabilities

The Cyber Threat Intelligence page, affectionately known as the Radar Page by some (or maybe just me), has been around for over 13 years.  See the Daily Mail article below for the sensational history.  :)  It has been through several redesigns, but retains a similar look and feel across the versions. Where to find the Radar Page: The...

4
  5398 Hits
  0 Comments

SANS Cyber Threat Conference London 2023

 Last week I was able to attend the CyberThreat 23 (CT23) conference in London, held by SANs and the National Cyber Security Centre (NCSC) The conference has been running for a few years now and from SANs marketing material the event is: Designed for security practitioners and spanning the full spectrum of offensive and defensive discipline, t...

0
  359 Hits
  0 Comments
IMG_00-_20231124-142135_1 Splunk: Building a Test Instance

Splunk: Building a Test Instance

TLDR: Building a Splunk Test instance is really useful, helps protect against prod outages and very performant hardware is now available for a fraction of the price it used to be; if you're willing to deal with some tech challenges! Splunk Test instance Many of our clients rely on Splunk as their production SIEM tool to monitor, detect and respond ...

0
  546 Hits
  0 Comments

Palo Alto Firewalls (End-of-Life) upgrade.

As my PA-220 firewall heads towards EoL I swapped it out for a PA-410 and OS 11.x I've worked professionally with firewall platforms for nearly 20 years, during that time I've configured Netscreen, Juniper, Palo Alto and Cisco to name a few of the dominant vendors. The most admin friendly and enjoyable platform to work with in m...

0
  747 Hits
  0 Comments

Review: NextDNS | Privacy, Security | Splunk App

I was listening to an InfoSec podcast on the drive back from a client recently (Privacy, Security & OSINT Show) it's a really good listen and I really appreciate Michael Bazzells work. One of the items in the podcast was NextDNS, a product which I've not come across before. NextDNS operates by you registering an account for a very mod...

0
  1440 Hits
  0 Comments

How To Spot The Flags in a Phishing Email

This simulated phishing email had two possible failure actions – clicking on the link or opening the PDF attachment. It was a particularly difficult scenario as it appeared to come from a real member of the CND team, however, there were a few indicators (red and amber flags) which could have been spotted. The reason we have labelled some of these a...

0
  540 Hits
  0 Comments

The Best UK City for Cyber Security Jobs

With digital landscapes evolving, cyber security has become a critical concern for businesses and organisations across the UK. As cyber threats continue to emerge, the demand for skilled professionals in this sector has skyrocketed. This article will cover serval topics around how the UK is ranking in cyber security across the globe, the best citie...

0
  1522 Hits
  0 Comments
hacktivism_sml

What is a Hacktivist?

There is no doubt you have heard the word 'hacker' in recent years, but are you familiar with the word hacktivist and what this means? Today we are going to explore what is a hacktivist, what is their purpose, why they perform some of their acts and what the difference is between hackers and hacktivists. What is a simple definition of hacktivist? A...

0
  121 Hits
  0 Comments
IMG_0351 Splunk .conf 23

Splunk .conf 23

TLDR: Excellent technical conference with great opportunities for meeting other Splunkers, sound in-depth technical workshops with a good deal of content to follow up on and study. Splunk as a tech company manages an effortlessly relaxed corporate culture that is very enjoyable to be a part of. Intro: This was to be my first global scale tech confe...

2
  1027 Hits
  0 Comments

Identifying Plagiarism Using AI Bots Like ChatGPT

For several months we have been seeing a huge interest in the capabilities of ChatGPT and with a high school teacher in the family, we have looked a little deeper in detecting it's use. At Computer Network Defence Ltd (CND) we will often test the resourcefulness of our new cyber security candidates by asking them to research a topic and d...

1
  1291 Hits
  0 Comments

Spear Phishing - Cyber Attacks

 We have all heard of Phishing attacks, where emails are used as bait to lure us into clicking on a link or opening an attachment. However, because we are now much wiser to the threat, attackers are having to work harder to lure us in by doing some research. These targeted phishing attacks are referred to as Spear Phishing, and humorously, if ...

10
  1118 Hits
  0 Comments

Digital Isle 2022

Digital Isle has concluded for 2023, CND had a wonderful time. We would like to thank the organisers for putting on such a riveting event. The lectures were all very informative and gave insight into what businesses in IoM will be facing in the years to come! Our CTO, Jeff, was part of the Cyber Blind Spot panel, and it was an exciting chat with ot...

0
  790 Hits
  0 Comments

Digital Isle 2022

CND is excited to announce that we will be at Digital Isle on 10th November. Digital Isle was created to support the tech sector, developing and implementing a strategy to support sustainable economic growth and establishing the Island as a centre of international excellence for the digital economy. Our very own CTO, Jeff, will be providing a lectu...

1
  833 Hits
  0 Comments
The-Techies-Finalist-Log_20221005-160630_1

CND have been shortlisted for the Techies' "Tech Team of the Year" award!

CND are delighted to announce that we have been shortlisted for the Techie's Awards' "Tech Team of the Year 2022" award. The Techies award scheme, which is now in its fifth year, celebrate the amazing tech innovation happening in the Swindon and Wiltshire commununity, and is designed to be inclusive with categories recognising organisations, projec...

0
  1093 Hits
  0 Comments

New Alerts Monday 19 September

New Alerts for IBM, HPE, WithSecure, and Linux. IBM  Vulnerabilities in libcurl such as bypassing security restrictions, obtaining sensitive information, and MitM attacks may affect Spectrum Protect Plus and Spectrum Copy Data Management. Highest CVSSv3 score of 9.8.More info. And here.Apache Commons Configuration could allow a remote attacker...

0
  855 Hits
  0 Comments

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/