News

TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
TL;DR We were recently on BBC Morning Live talking about issues with pet microchip data, helping some pet owners understand how they were being billed for services which they didn’t recall signing up ...
Done properly, digital forensic investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of digital forensics ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Vulnerability Advisory Time Travel Debugging: finding Windows GDI flaws Symeon Paraschoudis 10 Oct 2018 29 Min Read ...
Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong ...
Introduction The International Association of Classification Societies (IACS) have introduced two new Unified Requirements (UR); E26 “Cyber resilience of ships” and E27 “Cyber resilience of on-board ...
Aviation Cyber Security Security Blog DEF CON 28: Introduction to ACARS Alex Lomas 10 Aug 2020 19 Min Read ...