An Artificial Intelligence Response to Cyber Security Best Practice

By now, if you're in the tech industry I'm sure you've heard of the word 'ChatGPT' going around. But what is it? What is the point of ChatGPT and what are its capabilities? Well, this article isn't going to go…

Configuring FlexVPN Point-to-Point IKEv2 S-VTI with PKI Authentication

In the last post, we explored how to configure FlexVPN point-to-point IKEv2 S-VTI's with preshared keys. In this post, we will do the same but this time using another CSR1000v acting as a CA server. This will allow us to…

All Things Cyber Security – A Twitter Community

Twitter has recently added a new feature that allows you to join and participate in communities. I have therefore created a new community called 'All Things Cyber Security' where like-minded individuals can share and discuss cyber security topics. Whether you're…

Analysis of a Phishing Email Campaign Posing as Mobile Phone Company ‘EE’

I've been made aware of a new phishing email campaign that poses as the UK mobile phone company 'EE'. This article aims to identify typical attributes of a phishing email and more specifically show you what the EE phishing email…