TL;DR The exhibition My Wife and I visited the Carlsberg exhibition in Copenhagen in August 2025 and we were given wristbands ...
Our Paul Brennecker and Charles Hunter will be attending.
Managing vulnerability reports is difficult for an organisation.  In an ideal world, something like this happens: Everyone is ...
TL;DR Introduction In practice, it is still hard to keep secrets safe in the cloud. All major cloud service providers have ...
TL;DR Introduction Infostealers are not new malware. They have been around for decades. What has changed is how effective ...
CCTV is ubiquitous in the UK. A recent study estimates there are about 1.85m cameras across the UK – most in private premises. Most of those cameras will be connected to some kind of recording device, ...
On a recent Red Team engagement we got Domain Admin privileges on the on-premises Active Directory (AD) network. But we had not yet gained access to their cloud estate, which was hosted in Azure. Our ...
Unauthorised network access remains a significant threat, especially for organisations lacking robust network security controls. If an attacker infiltrates a building and connects their device to the ...