Hacking Games, Hacking Systems 3 Dec 2025 Discover how game hacking techniques like DLL injection and memory patching relate to real-world cybersecurity skills. Learn through... Read more
Penetration Testing: What to expect 27 Nov 2025 A practical overview of how penetration testing works, what it reveals and how it helps organisations strengthen their... Read more
You're absolutely right: Vibe coding in the world of... 8 Aug 2025 Explore how AI and 'vibe coding' are transforming penetration testing, from prompt-driven development to modular attack tools and... Read more
Remote Code Execution in Broadcom Altiris IRM 7 Jul 2025 A critical unauthenticated remote code execution (RCE) vulnerability was discovered in the Broadcom Symantec Altiris Inventory Rule Management... Read more
Exploring the Shadow Labyrinth 26 Jun 2025 How LRQA cracked the Shadow Labyrinth in Hack The Box’s 2025 CTF, using reverse engineering, decryption and custom... Read more
Next Level Smuggling with WebAssembly 14 Mar 2025 Using WebAssembly to deliver malicious payloads through HTML smuggling. Read more
The $1.5bn Bybit theft – what happened? 24 Feb 2025 An analysis of one of the most significant breaches in crypto history - the theft of $1.5 billion... Read more
Introducing Raccoon 6 Feb 2025 Introducing Raccoon - a C# tool for extending the screenshot functionality of Command and Control (C2) frameworks, even... Read more
Time Travel Debugging Shellcode with Binary Ninja 15 Jan 2025 Learn how to debug shellcode using Time Travel Debugging (TTD) in Binary Ninja. This guide walks you through... Read more
Binary Ninja Plugin 18 Sep 2024 Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*