News

TL;DR Closing the Loop Just before COVID struck the world, I was travelling through Colorado on a Sunday on a ski trip with ...
TL;DR Introduction  AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Introduction BIOS protection is the digital equivalent of a locked front door, but what if the doorbell doubled as a ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a front-row seat to the messy, magical, and ...
The Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) is a big-selling family hybrid SUV. It has an electric range of up to 30 miles or so plus petrol range of another 250ish miles. We ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
Third-party plugins are often the security Achilles heel of Content Management Systems (CMS). It seems like not a month goes by without one security researcher or another uncovers a vulnerability in a ...
TL;DR Restricted View allows users to read files, but not copy, download or print them Attackers will look for ways to circumvent these controls Traditional workarounds include manual transcription, ...