COVID-19 repercussions are coming and good companies will be laser focused on the clients; great companies will do this by embracing data platforms and analytics. Director of Financial Services, Chris Mills explains how to value your client through data excellence.
One common term that is often seen in CVEs relating to the heap is "use-after-free". The use-after-free vulnerability exploits a mistake made by the original author of a software and can result in devastating effects that range from remote code execution to the leaking of sensitive data. In this blog I'll explain what a use-after-free vulnerability is and how it works...
While reviewing different types of vulnerability scanning tools and services, it became very clear that testing such tools would require at least some known vulnerable applications to be configured. However, doing so may take up a considerable amount of time and effort. We decided to use a collection of pre-configured Docker containers and a Bash script to speed up this process.
With the merits of ESG investment performance being a hot topic, the conversation should be on responsible and sustainable investments. Yet the focus is on the data requirements and standards, which are critical to the successful delivery of this rapidly increasing branch of the investment world.
The last month has seen a spate of Wi-Fi vulnerabilities. Those that affect the Wi-Fi traffic are bad, but worse are those that allow attacks against the device itself. This blog provides an overview of the recent bugs, and offers some history on Wi-Fi exploitation.