News
TL;DR Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
TL;DR What are Android services? Android splits its communications into multiple components, some of which we’ve written about before. One of these components is service, which is a generic component ...
TL;DR Closing the Loop Just before COVID struck the world, I was travelling through Colorado on a Sunday on a ski trip with some friends. My work phone pinged with a message from a colleague (the ...
TL;DR Introduction AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Introduction BIOS protection is the digital equivalent of a locked front door, but what if the doorbell doubled as a reset button? The Framework 13 laptop has a chassis intrusion detection ...
We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The attacker delivered an attack that combined remote code execution, persistence, tunnelling, and a ...
Jo Dalton & Andrew Tierney are presenting: Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk ...
Shelley Booker will be on a panel covering: “The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a ...
TL;DR Perform a password audit in Active Directory (AD) Retrieve password hashes from the domain Crack passwords using tools like Hashcat and John the Ripper View statistic results with DPAT ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results