News

The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
US Office. Pen Test Partners Inc, 222 Broadway 22nd Floor, Suite 2525, New York, NY 10038, US +1 646 693 2501 ...
TL;DR Data from legitimate microchip databases may be leaking or being scraped Enumeration attacks, where chip ID numbers are guessed, expose owner contact details Vet and warden accounts often lack ...
IET – Cyber Security for Critical Industries ConferenceKen Munro will be presenting. Details TBC.
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
How Tos Double-Free RCE in VLC. A honggfuzz how-to Symeon Paraschoudis 21 Jun 2019 26 Min Read ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...