News

TL;DR Before you start First off, before we start Bluetooth hacking can be confusing, there are lots of references to tools that are a bit outdated, scripts that don’t run, and more. The actual ...
Speculative plan can run code on runners and expose cloud credentials. Learn how tokens are abused and how to lock it down ...
We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user ...
Making mistakes when complying with ETSI 303 645 ...
TL;DR Introduction Shellbags are a valuable forensic artifact, providing analysts with information about user interactions with folders in Windows. These registry keys record metadata such as folder ...
TL;DR Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how many proposal forms include questions that offer very little insight into the ...
TL;DR You’re on an AWS internal infrastructure test and need to get files out of the environment for report evidence. You have the ability to run commands in SSM , but inbound access to the target ...
TL;DR Introduction Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is ...
Our colleagues at PTP Consulting spend most of their time forensically unpicking credit card fraud data breaches on behalf of credit card brands. One of the most popular techniques for snaffling card ...
Automotive Security Security Blog Gone in six seconds? Exploiting car alarms Ken Munro 08 Mar 2019 10 Min Read ...
TL;DR Introduction AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is already publicly available if not privately hosted). This involves building ...
TL;DR Introduction When a data breach hits the news, it’s usually all about the numbers: millions of names, emails, and maybe even credit card details stolen. Sounds serious, right? But here’s the ...