TL;DR Introduction  It’s more common than you might think to miss built-in defences. Windows has a lot of features that help ...
We are seeking an enthusiastic security consultant to join our team. Working alongside some of the best hacking minds in the country, you will be delivering pen testing services to a diverse range of ...
Cloud adoption is still growing fast, with more businesses relying on the cloud to deploy and manage critical workloads. Whether through complex management of multi-cloud and hybrid infrastructures or ...
TL;DR Introduction Cloud compliance frameworks are a good place to start. Dashboards that show how your estate compares to ...
TL;DR Introduction Android splits its communications into multiple components, some of which we’ve written about before. One ...
As Red Teamers, we often find information in SharePoint that can be useful for us in later attacks. As part of this we regularly want to download copies of the file, or parts of their contents. In ...
At Infosecurity Europe this year, we demonstrated multiple methods to interrupt the shipping industry, several of which haven’t been demonstrated in public before, to our knowledge. Some of these ...
Kubernetes has changed the way we deploy and scale workloads. It’s powerful, flexible, and very good at hiding a lot of complexity. It is also very good at hiding security problems until someone ...
We’ve seen an increase in multi-stage Adversary in the Middle (AiTM) phishing BEC in M365. These usually originate from a compromised trusted party, and lead to a series of AiTM attacks and follow-on ...
The Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) is a big-selling family hybrid SUV. It has an electric range of up to 30 miles or so plus petrol range of another 250ish miles. We ...
As well as running the Hacking You Fat: The FitBit Aria workshop at DefCon 23’s IoT Village this year (more on that later) we also thought we’d take on their big fridge challenge: “Can you own our ...