Context Triggered Piecewise Hashing To Detect Malware Similarity 30 Jun 2015 At Nettitude we collect a large amount of malware binary samples, both from our Honeypot network, from our... Read more
The prestige in malware persistence 16 Jun 2015 Just like in magic tricks, a malware infection very often consists of three parts or acts. Read more
The Prestige in Malware Persistence 16 Jun 2015 Just like in magic tricks, a malware infection very often consists of three parts or acts. Paraphrasing the... Read more
Eight things to consider before deploying cyber threat intelligence 6 Jun 2015 Eight Things To Consider Before Deploying Cyber Threat Intelligence Read more
Malware Is Changing Daily! Are You Still Protected? 1 May 2015 One of the biggest challenges in detecting and protecting against malware is that attackers continually change their techniques... Read more
Loading A Weaponised Interactive PowerShell Session With Metasploit 27 Apr 2015 PowerShell is rapidly becoming the go to post exploitation method for hackers, with a plethora of awesome PowerShell... Read more
Version Tracking in Ghidra 16 Apr 2015 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
QNAP NAS – Remote Unauthenticated User To Admin Shell:... 8 Apr 2015 A number of security vulnerabilities have been identified in two applications hosted on the QNAP App Centre. When... Read more
Network Security Monitoring With Bro IDS, TCPDump And MongoDB 1 Apr 2015 Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment... Read more
CSRF and unsafe arbitrary file upload in nextgen gallery... 25 Mar 2015 LRQA's very own consultant explains the detected vulnerability and unsafe arbitrary file upload in NextGEN gallery for Wordpress... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*