News

TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
Shelley Booker will be on a panel covering: “The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a ...
TL;DR Data from legitimate microchip databases may be leaking or being scraped Enumeration attacks, where chip ID numbers are guessed, expose owner contact details Vet and warden accounts often lack ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
TL;DR Restricted View allows users to read files, but not copy, download or print them Attackers will look for ways to circumvent these controls Traditional workarounds include manual transcription, ...
Key relay attacks against keyless entry vehicles are well known. Many 3 rd party car alarm vendors market themselves as solutions to this. We have shown that fitting these alarms can make your vehicle ...