Update 24th December: Galen Hunt, Microsoft’s Distinguished Engineer, has backtracked on his original statement about eliminating C and C++. His LinkedIn post attracted more attention than he expected, prompting him …
Rebecca Sutton
Rebecca Sutton
Rebecca is a dedicated cybersecurity writer who specialises in transforming complex technical concepts into clear, accessible content. With a strong background in IT and a passion for digital security, she produces insightful articles, guides, and thought-pieces that bridge the gap between technical experts and wider audiences.
-
-
TLDR A critical n8n vulnerability tracked as CVE-2025-68613 has been discovered in the popular workflow automation platform. The flaw carries a CVSS score of 9.9 and allows authenticated attackers to …
-
TLDR Cloudflare experienced a major service disruption on 18 November 2025, affecting platforms including X, ChatGPT, Claude, and Spotify. The infrastructure provider identified the root cause as an oversized configuration …
-
TLDR A former defense contractor manager admitted selling sensitive cyber exploits to Russia obtained through intelligence intermediaries. Peter Williams pleaded guilty to stealing proprietary hacking tools from his employer and …
- Blog & Articles
AWS Outage Causes Widespread Internet Disruption: Amazon, Snapchat, and More Affected
TLDR An AWS outage on 20 October 2025 disrupted major services worldwide. The failure affected Amazon, Snapchat, Fortnite, Roblox, and dozens more platforms. Problems started at 08:11 BST in AWS’s …
-
A critical SQL injection vulnerability (CVE-2025-57423) discovered in MyClub 0.5 allowed unauthenticated attackers to compromise entire databases through a simple GET request. Thanks to responsible disclosure by William Fieldhouse of …
-
TLDR Kali Linux 2025.3 launches with 10 powerful new security tools including Caido web auditing toolkit, Detect It Easy file analysis, and Gemini CLI AI integration. The release brings back …
-
TLDR: Cloudflare successfully defended against a record-breaking 11.5 terabits per second DDoS attack that lasted just 35 seconds. The massive UDP flood originated primarily from compromised resources on Google Cloud …
-
At Aardwolf Security, we encounter the same challenge repeatedly: candidates armed with impressive certification portfolios who stumble when asked a fundamental questions such as: “How would you approach a real …
-
The UK government has introduced a historic UK ransomware ban targeting public sector organisations and critical infrastructure operators. This groundbreaking legislation marks the first comprehensive attempt to disrupt cybercriminal business …