News

TL;DR Introduction  AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a front-row seat to the messy, magical, and ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
US Office Pen Test Partners Inc, 222 Broadway 22nd Floor, Suite 2525, New York, NY 10038, US +1 646 693 2501 ...
We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The attacker delivered an attack that combined remote code execution, persistence, tunnelling, and a ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop client-side attacks such as Cross-Site Scripting (XSS), Clickjacking, data ...