Careers Contact
Home

LATEST NEWS

< BLOG / >

Using Python to Decrypt Dispind.A and Helminth HTTP Beacons

Microsoft’s Windows Defender Advanced Threat Hunting Team and Palo Alto’s Unit 42 recently published some great technical writes up that [...]
READ MORE ›

ImageMagick Undocumented Feature – RCE (CVE-2016-3714)

Overview: This past week a very interesting vulnerability (CVE-2016-3714) came out affecting ImageMagick – software used to convert, edit, and [...]
READ MORE ›

Beyond Automated Tools

< Overview > This talk is all about how to go beyond automated tools to hunt for vulnerabilities.  I discuss [...]
READ MORE ›

How to Start Your InfoSec Career

Overview: This webcast is hosted by Andrew, Luke, and Zack and we discuss tips and tricks for starting your InfoSec [...]
READ MORE ›

Use the X-Forwarded-For Header, Luke: Joomla RCE CVE-2015-8562

Summary: A recent vulnerability in Joomla (CVE-2015-8562) has been patched after reports of exploitation occurring in the wild impacting all [...]
READ MORE ›

Next Level Reconnaissance with Shodan and Censys

During the initial phases of a penetration test, online resources such as Shodan can serve as a starting point to [...]
READ MORE ›

Detecting and Understanding Emdivi HTTP C2

Detecting sophisticated cyber threats is an inherently difficult task.  Understanding what systems and information may have been compromised can be [...]
READ MORE ›

SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION

Contact
chevron-down