Skip content
Insights

The latest opinions from our industry experts.

Insights, reports and opinions from LRQA experts.

The latest opinions from our industry experts.

241 250 351 results

  • Appealing to a wider audience is top of the...

    Martin Cottam, Chair of ISO/TC 283, gives an update on what’s in the pipeline for ISO 45001 following...

    Read more
    Tokyo, Japan view of Shibuya Crossing, one of the busiest crosswalks in the world.
  • The assessor view on managing dangerous substances at work.

    To mark the European Week for Safety and Health at Work, LRQA's leading voices on OH&S share their...

    Read more
    HAZMAT Team Members Discusses Chemical Disaster
  • CVE-2018-8955: Bitdefender GravityZone Arbitrary Code Execution

    We recently identified a vulnerability in the digitally signed Bitdefender GravityZone installer. The vulnerability allows an attacker to...

    Read more
  • DerbyCon 2018 CTF Write Up

    We have just returned from the always amazing DerbyCon 2018 conference. We competed in the 48 hour Capture the Flag...

    Read more
  • PED: Five questions to ask your sub-contractors.

    Don't let your sub-contractors put you at risk of running afoul of the Pressure Equipment Directive. We give...

    Read more
    PED five questions for subcontractors
  • CVE-2018-5240: Symantec Management Agent (Altiris) Privilege Escalation

    During a recent red team exercise, we discovered a vulnerability within the latest versions of the Symantec Management...

    Read more
  • CVE-2018-12897: Solarwinds Dameware Mini Remote Control Local SEH Buffer...

    Dameware Mini Remote Control (MRC) is a remote administration utility allowing remote access to end user devices for...

    Read more
  • Introducing Scrounger - iOS and Android mobile application penetration...

    Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. ...

    Read more
  • Extending C2 Lateral Movement – Invoke-Pbind

    Invoke-Pbind is a mini post exploitation framework written in PowerShell, which builds C2 communications over SMB named pipes...

    Read more
  • Using PoolTags to Fingerprint Hosts

    Commonly, malware will fingerprint the host it executes on, in an attempt to discover more about its environment...

    Read more

Error

Error

No results found

No results found that match your query

Loading results