TL;DR Introduction  It’s more common than you might think to miss built-in defences. Windows has a lot of features that help ...
We are seeking an enthusiastic security consultant to join our team. Working alongside some of the best hacking minds in the country, you will be delivering pen testing services to a diverse range of ...
Cloud adoption is still growing fast, with more businesses relying on the cloud to deploy and manage critical workloads. Whether through complex management of multi-cloud and hybrid infrastructures or ...
TL;DR Introduction Cloud compliance frameworks are a good place to start. Dashboards that show how your estate compares to ...
TL;DR Introduction Android splits its communications into multiple components, some of which we’ve written about before. One ...
If I had a penny for every time someone said to me “let’s measure our security culture by phishing our staff” I’d probably be able to fill my car up. It’s a really easy thing to do, you carry out some ...
The Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) is a big-selling family hybrid SUV. It has an electric range of up to 30 miles or so plus petrol range of another 250ish miles. We ...
CCTV is ubiquitous in the UK. A recent study estimates there are about 1.85m cameras across the UK – most in private premises. Most of those cameras will be connected to some kind of recording device, ...
As well as running the Hacking You Fat: The FitBit Aria workshop at DefCon 23’s IoT Village this year (more on that later) we also thought we’d take on their big fridge challenge: “Can you own our ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
The ability to edit Group Policy Object (GPOs) from non-domain joined computers using the native Group Policy editor has been on my list for a long time. This blog post takes a deep dive into what ...