The ultimate guide to cyber security risk assessments 14 Aug 2018 We go into detail about the steps you need to take to conduct a cyber security risk assessment.... Read more
Using PoolTags to Fingerprint Hosts 8 Aug 2018 Commonly, malware will fingerprint the host it executes on, in an attempt to discover more about its environment... Read more
CVE-2017-16245 & CVE-2017-16246: Avecto Defendpoint Multiple Vulnerabilities 30 Jul 2018 This post focuses on the “application control” aspect of Avecto. Last year I discovered two vulnerabilities in the... Read more
Python Server for PoshC2 26 Jul 2018 We are delighted to announce the release of our PoshC2 Python Server, allowing cross-platform support. Read more
After WNE: Three big topics in the nuclear sector. 17 Jul 2018 LRQA's Simon Emeny, our voice on nuclear supply chain inspection, discusses three big topics from the 2018 World... Read more
Taking the lead on health and safety. 16 Jul 2018 In this interview, Martin Cottam discusses his appointment as Chair of the ISO Technical Committee for OH&S Management... Read more
COM and the PowerThIEf 10 Jul 2018 Recently, Component Object Model (COM) has come back in a big way, particularly with regards to it being... Read more
Improving safety management: A China focus 10 Jul 2018 How we can manage safety across the chemical industry in China. Discussing the importance of improving safety managmeent... Read more
CVE-2018-6851 to CVE-2018-6857: Sophos Privilege Escalation Vulnerabilities 25 Jun 2018 We have recently disclosed a list of vulnerabilities to Sophos that allow local attackers to elevate their privileges... Read more
CVE-2018-10956: Unauthenticated Privileged Directory Traversal in IPConfigure Orchid Core... 14 Jun 2018 IPConfigure Orchid Core VMS is a Video Management System that is vulnerable to a directory traversal attack, which... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*