News

We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user ...
TL;DR Introduction Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is ...
TL;DR Introduction Shellbags are a valuable forensic artifact, providing analysts with information about user interactions ...
TL;DR The Problem You’ve done a build review on a host and need to get files from a host, or need to access an application, ...
TL;DR   Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
The Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) is a big-selling family hybrid SUV. It has an electric range of up to 30 miles or so plus petrol range of another 250ish miles. We ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
TL;DR Restricted View allows users to read files, but not copy, download or print them Attackers will look for ways to circumvent these controls Traditional workarounds include manual transcription, ...