News
We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user ...
Making mistakes when complying with ETSI 303 645 ...
TL;DR Introduction Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is ...
TL;DR Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
TL;DR Introduction Shellbags are a valuable forensic artifact, providing analysts with information about user interactions ...
TL;DR The Problem You’ve done a build review on a host and need to get files from a host, or need to access an application, ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results