Pwn2Own - When The Latest Firmware Isn't 1 Nov 2023 For the second year running, LRQA Nettitude took part in the well-known cyber security competition Pwn2Own, held in... Read more
Preventing Type Confusion with CastGuard 18 Oct 2023 Built into the Microsoft C++ compiler and runtime, CastGuard is a pivotal security enhancement designed to significantly reduce... Read more
Zenbleed - AMD Side-Channel Attack Targets Vectorised Functions 30 Aug 2023 This article provides a technical analysis of Zenbleed, a side-channel attack affecting all AMD Zen 2 processors. Tavis... Read more
LRQA Nettitude's Approach to Artificial Intelligence 5 Jul 2023 The exploding popularity of AI and its proliferation within the media has led to a rush to integrate... Read more
Flipper Zero Experiments - Sub-GHz 5 Jun 2023 This is the tagline associated with Kali Linux, a Linux distribution used by security researchers, penetration testers, and... Read more
ETWHash - "He who listens, shall receive" 3 May 2023 ETWHash is a small C# tool used during Red Team engagements, that can consume ETW SMB events and... Read more
Creating an IR Nightmare Drop Box 21 Apr 2023 A common objective of physical assessments is placement of a drop box to establish communication out of the... Read more
Using LoRa as a Side Channel 19 Apr 2023 This article will focus on using a LoRa to create a side channel using a public LoRa infrastructure.... Read more
I Don't Need a Badge - Lessons Learned from... 22 Mar 2023 A covert entry assessment is a physical security assessment in which penetration testers try to gain access to... Read more
Exploiting Network Security Cameras: Understanding and Mitigating the Risks 15 Feb 2023 Security cameras are an important tool for protecting homes and businesses. While they provide valuable assurance for physical... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*