Creating value through technology and innovation. 22 Mar 2017 As a collective, we need to be looking at smarter and better ways of working, from enhancing exportation... Read more
Old red or new red? 10 Mar 2017 Henk Kombrink: Differentiating between Triassic and Devonian in the Moray Firth – lr.org Read more
Effectively analysing sysmon logs 9 Mar 2017 We previously covered setting up and using sysmon (System Monitor), which is part of the Sysinternals suite from Microsoft. In this... Read more
Putting attackers in hi vis jackets with sysmon 16 Feb 2017 Sysmon (short for system monitor) has been part of the Sysinternals suite for several years. It comprises kernel-mode driver... Read more
More XSS Shenanigans 3 Feb 2017 In September, we released our XSS Payloads collection of scripts and they went down really well within the pen-testing community.... Read more
Who owns your runtime? 11 Jan 2017 Can mobile applications trust their own runtime environment? The answer to this burning question that has no doubt... Read more
Fun with Windows binaries - application whitelist bypass using... 15 Dec 2016 We were inspired by the work @subTee has done with application whitelisting. Consequently, we decided to have a hunt around for legitimate... Read more
PoshC2 - new features 1 Dec 2016 There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we... Read more
An analysis of the RIG exploit kit 27 Oct 2016 Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*