Skip content

21 30 152 results

Filter by

  • Pwn2Own - When The Latest Firmware Isn't

    For the second year running, LRQA Nettitude took part in the well-known cyber security competition Pwn2Own, held in...

    Read more
  • Preventing Type Confusion with CastGuard

    Built into the Microsoft C++ compiler and runtime, CastGuard is a pivotal security enhancement designed to significantly reduce...

    Read more
  • Zenbleed - AMD Side-Channel Attack Targets Vectorised Functions

    This article provides a technical analysis of Zenbleed, a side-channel attack affecting all AMD Zen 2 processors. Tavis...

    Read more
  • LRQA Nettitude's Approach to Artificial Intelligence

    The exploding popularity of AI and its proliferation within the media has led to a rush to integrate...

    Read more
  • Flipper Zero Experiments - Sub-GHz

    This is the tagline associated with Kali Linux, a Linux distribution used by security researchers, penetration testers, and...

    Read more
  • ETWHash - "He who listens, shall receive"

    ETWHash is a small C# tool used during Red Team engagements, that can consume ETW SMB events and...

    Read more
  • Creating an IR Nightmare Drop Box

    A common objective of physical assessments is placement of a drop box to establish communication out of the...

    Read more
  • Using LoRa as a Side Channel

    This article will focus on using a LoRa to create a side channel using a public LoRa infrastructure....

    Read more
  • I Don't Need a Badge - Lessons Learned from...

    A covert entry assessment is a physical security assessment in which penetration testers try to gain access to...

    Read more
  • Exploiting Network Security Cameras: Understanding and Mitigating the Risks

    Security cameras are an important tool for protecting homes and businesses. While they provide valuable assurance for physical...

    Read more

Error

Error

No results found

No results found that match your query

Loading results