blog
29.10.2025 How typosquatting tricked me (a bit)
Typosquatting is a popular method using similarly looking names to draw people into malicious content – such as phishing websites or fake software packages. It leverages our “brain optimization” that matches what we see with what we already know – even if it’s not exactly the same. I haven’t installed any shady software, but it’s still a good example how easily our brain could be used against us by utilizing our biases.
blog
16.10.2025 A review of the “Concluding report of the High-Level Group on access to data for effective law enforcement”
As I’ve written here, the EU unveiled a roadmap for addressing the encryption woes of law enforcement agencies in June 2025. As a preparation for this push, a “High-Level Group on access to data for effective law enforcement” has summarized the problems for law enforcement and developed a list of recommendations. Let’s have a look at this report.
blog
01.07.2025 Encryption vs. Lawful Interception: EU policy news
There are some new developments in the EU policy sphere. Here are the main points.
blog
11.06.2025 CRA Vulnerability Reports: why would we not share them with other CSIRTs?
We will get reports under the Cyber Resilience Act concerning actively exploited vulnerabilities of products with digital elements. When should a national CSIRT delay the dissemination of such reports to other CSIRTs in the CSIRTs Network?