Rocktastic 23 Sep 2015 To a penetration tester, passwords are very interesting. They are often simple dictionary words and they can tell... Read more
Reducing The Attack Surface: A Human Error Perspective 9 Sep 2015 The efforts required for a successful cyber-attack do not match the efforts that are invested to build a... Read more
Cyber Fighting Power – Who Has The Upper Hand? 3 Sep 2015 Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in... Read more
Cyber fighting power - who has the upper hand? 3 Sep 2015 Cyber Fighting Power, Who Has The Upper Hand? Read more
The Ashley Madison Saga Continues 21 Aug 2015 On July 15th news articles began to appear, claiming that the one of the world’s most controversial online dating... Read more
Nettitude Uncovers WordPress Vulnerabilities 21 Jul 2015 Nettitude has recently observed multiple attacks utilising existing and known vulnerabilities in the WordPress blogging and publishing platform. Read more
Fuzzing with American Fuzzy Lop (AFL) 14 Jul 2015 In a previous entry we gave a brief introduction to the concept of fuzzing and why we use... Read more
Fuzzing with American Fuzzy Lop (AFL) 14 Jul 2015 In a previous entry we gave a brief introduction to the concept of fuzzing and why we use... Read more
VMware Multiple Products - Privilege Escalation 10 Jul 2015 This article summarises the findings and the impact of a vulnerability that we recently discovered in three major... Read more
Context Triggered Piecewise Hashing To Detect Malware Similarity 30 Jun 2015 At Nettitude we collect a large amount of malware binary samples, both from our Honeypot network, from our... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*