Tl;DR Introduction In my previous job as the SOC manager for a public sector organisation, I would often see attempts from ...
TL;DR The problem Have you ever found yourself in a client’s hardened, containerised environment where you needed to scan ...
TL;DR Introduction When responding to an incident, logs provide a vital record of events within a system and serve as a critical source of evidence during an incident investigation. They help identify ...
In the field of maritime cyber, we often cite the movie Speed 2: Cruise Control from 1997 as an interesting prediction of the future. It illustrates the reality of today quite well, despite being ...
US Office Pen Test Partners Inc, 222 Broadway 22nd Floor, Suite 2525, New York, NY 10038, US +1 646 693 2501 ...
Last year, about the time we were messing around with a virtually unheard-of hardware wallet we got a bit excited about the word “unhackable”. Long story short, I ended up supporting a selection of ...
Over the last year of looking at kids GPS tracking watches we have found some staggering issues. With these devices it almost seems that having multiple security issues is the new normal. While ...
Third-party plugins are often the security Achilles heel of Content Management Systems (CMS). It seems like not a month goes by without one security researcher or another uncovers a vulnerability in a ...
CCTV is ubiquitous in the UK. A recent study estimates there are about 1.85m cameras across the UK – most in private premises. Most of those cameras will be connected to some kind of recording device, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results