A recently recorded run-through of our popular session providing an overview on the Dark Web.
A walk-through demo of exploiting web application vulnerabilities on an example site we built.
This blog provides an update on coronavirus related threats, and covers our own research in using certificate transparency logs to identify malicious domain registration.
Everyone knows about the traditional threat of phishing, but what about BEC, credential phishing or sextortion? This blog covers the continuing threat of phishing, as well as some of the newer threats.
Access cards are used everywhere on a day to day business, ranging from highly secure facilities to medium scale enterprises to small businesses. Most access cards use some kind of Radio Frequency ID (RFID) technology.