News
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
TL;DR We were recently on BBC Morning Live talking about issues with pet microchip data, helping some pet owners understand how they were being billed for services which they didn’t recall signing up ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Vulnerability Advisory Time Travel Debugging: finding Windows GDI flaws Symeon Paraschoudis 10 Oct 2018 29 Min Read ...
Introduction The International Association of Classification Societies (IACS) have introduced two new Unified Requirements (UR); E26 “Cyber resilience of ships” and E27 “Cyber resilience of on-board ...
Aviation Cyber Security Security Blog DEF CON 28: Introduction to ACARS Alex Lomas 10 Aug 2020 19 Min Read ...
Introduction This guide deals with threat modelling and early stages of development so that security issues and controls are identified before committing to manufacturing. Current attack methods, and ...
How Tos Security Blog How To Do Firmware Analysis. Tools, Tips, and Tricks Dave Null 03 May 2019 27 Min Read ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results