News

TL;DR   Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
TL;DR What are Android services? Android splits its communications into multiple components, some of which we’ve written about before. One of these components is service, which is a generic component ...
TL;DR Closing the Loop Just before COVID struck the world, I was travelling through Colorado on a Sunday on a ski trip with some friends. My work phone pinged with a message from a colleague (the ...
TL;DR Introduction  AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Introduction BIOS protection is the digital equivalent of a locked front door, but what if the doorbell doubled as a reset button? The Framework 13 laptop has a chassis intrusion detection ...
We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The attacker delivered an attack that combined remote code execution, persistence, tunnelling, and a ...
Jo Dalton & Andrew Tierney are presenting: Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk ...
Shelley Booker will be on a panel covering: “The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a ...
TL;DR Perform a password audit in Active Directory (AD) Retrieve password hashes from the domain Crack passwords using tools like Hashcat and John the Ripper View statistic results with DPAT ...