News
TL;DR Introduction AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
TL;DR Introduction BIOS protection is the digital equivalent of a locked front door, but what if the doorbell doubled as a ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
US Office Pen Test Partners Inc, 222 Broadway 22nd Floor, Suite 2525, New York, NY 10038, US +1 646 693 2501 ...
Ken Munro will be presenting: Details TBC. This is a member only event.
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
Over the last year of looking at kids GPS tracking watches we have found some staggering issues. With these devices it almost seems that having multiple security issues is the new normal. While ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results