News
TL;DR Introduction AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Closing the Loop Just before COVID struck the world, I was travelling through Colorado on a Sunday on a ski trip with some friends. My work phone pinged with a message from a colleague (the ...
TL;DR Introduction BIOS protection is the digital equivalent of a locked front door, but what if the doorbell doubled as a ...
TL;DR What are Android services? Android splits its communications into multiple components, some of which we’ve written about before. One of these components is service, which is a generic component ...
Shelley Booker will be on a panel covering: “The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a ...
Jo Dalton & Andrew Tierney are presenting: Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk ...
TL;DR We were recently on BBC Morning Live talking about issues with pet microchip data, helping some pet owners understand how they were being billed for services which they didn’t recall signing up ...
We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The attacker delivered an attack that combined remote code execution, persistence, tunnelling, and a ...
TL;DR Perform a password audit in Active Directory (AD) Retrieve password hashes from the domain Crack passwords using tools like Hashcat and John the Ripper View statistic results with DPAT ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results