•  Oxford: +44 (0)1865 877830 
  • Manchester: +44 (0)161 713 0176 
  •  London: +44 (0)203 5983740 
  •  New York: +1 646-781-7580 
  • Dubai: +971 (0)4 427 0429

Blog

You are here

By Gina

How to Spot Phishing Email Attacks

Nov 17, 2017

Social engineering attacks are becoming increasingly popular amongst attackers, as a strategy to breach companies. Continue reading

By Antonio

Quick Comparison Between iOS and Android Encryption

Nov 13, 2017

Encryption in mobile devices is tricky and often developers do not fully understand the mechanisms that iOS and Android, the most common operating systems for mobile devices, provide to ensure data stored on the devices remains relatively secure. Continue reading

By Daniel

PostgreSQL 9.x Remote Command Execution

Oct 26, 2017

During a recent penetration test I was able to gain access to a PostgreSQL 9.0 service. Continue reading

By Wes

Discovering Sensitive Information in File Shares

Oct 05, 2017

When carrying out internal penetration testing engagements, one of the first areas a penetration tester will focus on is identifying which shares are accessible to low privileged domain users or anonymous users in the hope of finding sensitive inf Continue reading

By Marius

Active Directory Password Auditing

Oct 02, 2017

One of the recurring issues in our internal penetration tests is inadequate password management, which in most cases leads to a fast takeover of the Active Directory (AD) domain. Continue reading

By Dougie

Scanning IPv6 Networks

Sep 22, 2017

As a networking student I remember reading about IPv6 and its imminent introduction on more than one occasion. Continue reading

By Guy

Changes to the Cyber Essentials Questionnaire

Sep 15, 2017

A new version of the CREST Cyber Essentials questionnaire (part of the Cyber Essentials assessment) has been made available by CREST, with a grace period of until September the 28th 2017 for using the older version for submissions. Continue reading

By Matt

Do You WannaCry? A Taste of SMB Exploitation

Sep 08, 2017

On Friday, 12th May 2017, an unprecedented ransomware attack, named WannaCry infected more than 230,000 computers in 150 countries and a nu Continue reading

By Thanat

Analysing Java Stack Traces and Determining the Open Source Software Version

Aug 08, 2017

Stack traces are commonly used for debugging purposes by software developers in order to find what went wrong in the application they are developing. Continue reading

By Robin

Reposcanner

Aug 02, 2017

Reposcanner is a Python script designed to scan Git repositories looking for interesting strings, such as API keys or hard-coded passwords, inspired by Continue reading

Pages