TL;DR Introduction Digital Forensics and Incident Response (DFIR) has a certain appeal to aspiring cybersecurity ...
TL;DR Introduction I live in the countryside & as a result, know quite a few farmers. The subject of connected farming ...
Gerard Kerrigan will be on the panel of judges at the Hampshire and Sussex Cyber Cluster’s Dragons’ Den-style event.
TL;DR Chartership and professional titles UKCSC has announced that the CHECK Team Leaders and CHECK Team Members will be ...
We help keep money in the banks, planes in the sky, and the lights on.
Unit 2, Verney Junction Business Park, ...
Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails  Everyone is implementing AI chatbots to ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
Well, that’s the Svakom Siime Eye, a vibrator endoscope. Yes, this thing exists. It is a pretty normal, slightly awkwardly-shaped vibrator with a camera in the end. It costs $250. But, more relevant ...
Threat modeling works to identify, communicate, and understand threats and mitigations within the context of protecting something of value. A threat model is a structured representation of all the ...