News
TL;DR Introduction Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is ...
TL;DR The Problem You’ve done a build review on a host and need to get files from a host, or need to access an application, ...
TL;DR Introduction Shellbags are a valuable forensic artifact, providing analysts with information about user interactions ...
TL;DR Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
TL;DR Introduction AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is already publicly available if not privately hosted). This involves building ...
Shelley Booker will be on a panel covering: “The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
How Tos How to load unsigned or fake-signed apps on iOS George Waterfield 28 May 2025 10 Min Read ...
TL;DR Using dual-homed devices as a segregation tool is not recommended as a security design solution Use dedicated hardware and robust firewalls to segregate networks to limit access to critical ...
TL;DR Restricted View allows users to read files, but not copy, download or print them Attackers will look for ways to circumvent these controls Traditional workarounds include manual transcription, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results