From macro to malware - a step by step... 3 Oct 2016 We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office... Read more
ZeroPress 16 Sep 2016 ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a... Read more
ZeroPress - A WordPress Vulnerability Hunter 16 Sep 2016 Finding WordPress plugin vulnerabilities is like shooting fish in a barrel. Like taking candy from a baby. Like…... Read more
Rocktastic: a word list on steroids 8 Sep 2016 Bigger isn’t always better, but sometimes it is. If you need a huge word list before you... Read more
Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have... 2 Sep 2016 Sometimes, particularly when dealing with a system perimeter, there’s very little attack surface to deal with. You may find... Read more
A perspective on unconventional oil and gas. 26 Aug 2016 Recent press coverage has described how shale oil and gas production will either solve the world’s energy needs... Read more
PoshC2 v1.0 released, a command and control framework 12 Jul 2016 PoshC2 is a proxy aware command and control framework written completely in PowerShell. It is designed to aid penetration... Read more
Technical excellence - benefits of presenting at an industry... 5 Jul 2016 Key conferences provide a great platform from which to share ideas and expertise and help develop innovative solutions... Read more
24 x 7 SOCs: the answer to your monitoring... 8 Jun 2016 Most organisations believe that simply by having a SOC 24 x 7 they have enhanced security and are... Read more
QNAP Android: Don't Over Provide 7 Jun 2016 The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from unintended data leakage. A malicious process can... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*