TL;DR The problem Have you ever found yourself in a client’s hardened, containerised environment where you needed to scan ...
TL;DR  Introduction When responding to an incident, logs provide a vital record of events within a system and serve as a critical source of evidence during an incident investigation. They help ...
TL;DR Introduction In the field of maritime cyber, we often cite the movie Speed 2: Cruise Control from 1997 as an ...
US Office Pen Test Partners Inc, 222 Broadway 22nd Floor, Suite 2525, New York, NY 10038, US +1 646 693 2501 ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails Everyone is implementing AI chatbots to ...
Over the last year of looking at kids GPS tracking watches we have found some staggering issues. With these devices it almost seems that having multiple security issues is the new normal. While ...
The events in Baltimore earlier this year brought maritime cybersecurity into the spotlight. Initial outlandish claims asserted that the MV Dali was certainly hacked, whilst others made the equally ...
The Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) is a big-selling family hybrid SUV. It has an electric range of up to 30 miles or so plus petrol range of another 250ish miles. We ...
If you are distributing or selling smart devices in to the UK market, your products will need to be compliant with the UK Product Security and Telecommunications Act. The manufacturer must provide ...
A few weeks back we read a story on the BBC web site about a BBC employee seeing someone else’s video footage on the mobile app for their home security camera. It wasn’t clear how this happened, but ...