Security advisory for the Verve Connect VH510 router.
This blog provides an overview of the domain email protections: SPF, DKIM and DMARC, and introduces a basic tool to grab and parse a domains records.
This blogs provides an introduction into malicious content that can be found in documents, and our new tool that can help find such content.
A recently recorded run-through of our popular session providing an overview on the Dark Web.
This blog offers a run-through and some analysis on this week's announcement by Apple that they're shifting the computer ranges to run on their own ARM-based silicon, instead of traditional Intel-based chips.
One common term that is often seen in CVEs relating to the heap is "use-after-free". The use-after-free vulnerability exploits a mistake made by the original author of a software and can result in devastating effects that range from remote code execution to the leaking of sensitive data. In this blog I'll explain what a use-after-free vulnerability is and how it works...
What security lessons can we learn from two recent reports on security breaches and the most exploited vulnerabilities?
Collated examples of phishing and scams we've collected and been sent.
An overview of getting started with Bluetooth Low Energy development on the Nordic Semiconductors nRF52840 development kit, using ARM's Mbed OS.
A walk-through demo of exploiting web application vulnerabilities on an example site we built.