Who owns your runtime? 11 Jan 2017 Can mobile applications trust their own runtime environment? The answer to this burning question that has no doubt... Read more
Fun with Windows binaries - application whitelist bypass using... 15 Dec 2016 We were inspired by the work @subTee has done with application whitelisting. Consequently, we decided to have a hunt around for legitimate... Read more
PoshC2 - new features 1 Dec 2016 There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we... Read more
An analysis of the RIG exploit kit 27 Oct 2016 Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This... Read more
Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the... 13 Oct 2016 We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting... Read more
EN 10204 Type 3.2 certification getting complex? 10 Oct 2016 Confused about EN 10204 Type 3.2 certification? LRQA breaks down the issue that many companies are facing as... Read more
From macro to malware - a step by step... 3 Oct 2016 We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office... Read more
ZeroPress 16 Sep 2016 ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a... Read more
ZeroPress - A WordPress Vulnerability Hunter 16 Sep 2016 Finding WordPress plugin vulnerabilities is like shooting fish in a barrel. Like taking candy from a baby. Like…... Read more
Rocktastic: a word list on steroids 8 Sep 2016 Bigger isn’t always better, but sometimes it is. If you need a huge word list before you... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*