News
TL;DR Introduction Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is ...
TL;DR Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
TL;DR Introduction Shellbags are a valuable forensic artifact, providing analysts with information about user interactions ...
TL;DR What are Android services? Android splits its communications into multiple components, some of which we’ve written about before. One of these components is service, which is a generic component ...
TL;DR The Problem You’ve done a build review on a host and need to get files from a host, or need to access an application, ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
UK Government Environment Agency web site had an open redirect that was actively being used to redirect to various porn sites, including OnlyFans clone sites. Disclosure should have been easy but wasn ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results