News
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR Data from legitimate microchip databases may be leaking or being scraped Enumeration attacks, where chip ID numbers are guessed, expose owner contact details Vet and warden accounts often lack ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
The Women’s Society of Cyberjutsu (WSC) June 2025 webinar ...
Paul Brownridge will be presenting: Breach preparation. When it’s all going south, what should you wish that you had done yesterday?
TL;DR: This year PTP Cyber Fest had more villages, more speakers, and more chances for people to get involved. Thank you to our partners RiverSafe, Retail & Hospitality ISAC, Automotive ISAC, and the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results