Skip content

21 30 153 results

Filter by

  • Preventing Type Confusion with CastGuard

    Built into the Microsoft C++ compiler and runtime, CastGuard is a pivotal security enhancement designed to significantly reduce...

    Read more
  • Zenbleed - AMD Side-Channel Attack Targets Vectorised Functions

    This article provides a technical analysis of Zenbleed, a side-channel attack affecting all AMD Zen 2 processors. Tavis...

    Read more
  • LRQA's Approach to Artificial Intelligence

    The exploding popularity of AI and its proliferation within the media has led to a rush to integrate...

    Read more
  • Flipper Zero Experiments - Sub-GHz

    This is the tagline associated with Kali Linux, a Linux distribution used by security researchers, penetration testers, and...

    Read more
  • ETWHash - "He who listens, shall receive"

    ETWHash is a small C# tool used during Red Team engagements, that can consume ETW SMB events and...

    Read more
  • Creating an IR Nightmare Drop Box

    A common objective of physical assessments is placement of a drop box to establish communication out of the...

    Read more
  • Using LoRa as a Side Channel

    This article will focus on using a LoRa to create a side channel using a public LoRa infrastructure....

    Read more
  • I Don't Need a Badge - Lessons Learned from...

    A covert entry assessment is a physical security assessment in which penetration testers try to gain access to...

    Read more
  • Exploiting Network Security Cameras: Understanding and Mitigating the Risks

    Security cameras are an important tool for protecting homes and businesses. While they provide valuable assurance for physical...

    Read more
  • CVE-2022-25026 & CVE-2022-25027: Vulnerabilities in Rocket TRUfusion Enterprise

    Nettitude recently conducted a penetration test for a customer who used Rocket TRUfusion Enterprise within their external infrastructure....

    Read more

Error

Error

No results found

No results found that match your query

Loading results