Category: Security assessment and testing
Common Language Runtime Hook for Persistence
This blog post explains how it is possible to execute arbitrary code and maintai...
Finding and addressing Active Directory vulnerabilities
This is the third part of a blog series looking at common vulnerabilities found ...
Top Findings from Red Team Engagements
Following on from our previous post about common Red Team findings we now look a...
Analysing Red Team Findings
In a recent white paper we took a look at what a Red Teaming test is, why you mi...
Security in the (Hybrid) Cloud: Containerization
This is the third and final entry in a series of blog posts looking at how we ar...
Security in the (Hybrid) Cloud: Integrating Internal Systems
This is the second of a series of three blog posts looking at how we are evolvin...