TL;DR The problem Have you ever found yourself in a client’s hardened, containerised environment where you needed to scan ...
TL;DR Introduction In the field of maritime cyber, we often cite the movie Speed 2: Cruise Control from 1997 as an ...
TL;DR Introduction It’s strange how satisfying it is to turn off the lights, set up a tent under the stars, and watch the ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails Everyone is implementing AI chatbots to ...
In part one we started hacking Bluetooth and made a little £2 key-finder beep using only Android and Linux. If you haven’t read that post, I would recommend it as a primer to the devices, BLE and what ...
On a Red Team engagement we entered a busy multicloud estate. AWS, GCP and Azure were all used, with Terraform Cloud orchestrating every change. That brings speed and consistency, but it also ...
Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is overlooked. The thumbcache stores small previews of images, videos and documents and can persist even ...
We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The attacker delivered an attack that combined remote code execution, persistence, tunnelling, and a ...
“Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session where insider threats take centre stage, driven by audience participation ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
When we carry out security assessments in Operational Technology (OT) and Industrial Control System (ICS) environments, one thing that often stands out is the use of dual-homed devices. In this blog ...