Introducing Scrounger - iOS and Android mobile application penetration... 23 Aug 2018 Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. ... Read more
Extending C2 Lateral Movement – Invoke-Pbind 16 Aug 2018 Invoke-Pbind is a mini post exploitation framework written in PowerShell, which builds C2 communications over SMB named pipes... Read more
The ultimate guide to cyber security risk assessments 14 Aug 2018 We go into detail about the steps you need to take to conduct a cyber security risk assessment.... Read more
Using PoolTags to Fingerprint Hosts 8 Aug 2018 Commonly, malware will fingerprint the host it executes on, in an attempt to discover more about its environment... Read more
Why risk management should underpin a cyber security strategy. 30 Jul 2018 Rowland Johnson, CEO at Nettitude, discussed the key areas organisations should consider when addressing cyber security. Read more
CVE-2017-16245 & CVE-2017-16246: Avecto Defendpoint Multiple Vulnerabilities 30 Jul 2018 This post focuses on the “application control” aspect of Avecto. Last year I discovered two vulnerabilities in the... Read more
Python Server for PoshC2 26 Jul 2018 We are delighted to announce the release of our PoshC2 Python Server, allowing cross-platform support. Read more
After WNE: Three big topics in the nuclear sector. 17 Jul 2018 LRQA's Simon Emeny, our voice on nuclear supply chain inspection, discusses three big topics from the 2018 World... Read more
Taking the lead on health and safety. 16 Jul 2018 In this interview, Martin Cottam discusses his appointment as Chair of the ISO Technical Committee for OH&S Management... Read more
COM and the PowerThIEf 10 Jul 2018 Recently, Component Object Model (COM) has come back in a big way, particularly with regards to it being... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*