HOME
SERVICES
HUMAN
TECHNICAL
PHYSICAL
TESTIMONIALS
GUIDANCE
ABOUT
BLOG
CONTACT
More
Use tab to navigate through the menu items.
All Posts
Human
Technical
Physical
Top Tips
Outreach
Search
Log in / Sign up
Jessica Barker
May 5
2 min
Happy ******** Day
FC
Mar 31
7 min
Three things that every developer should know about cyber security
Richard
Feb 14
4 min
You're the Salt to my Hash
Richard
Feb 8
5 min
Divide and Contain
FC
Jan 26
3 min
Notes from a Pentester: How we found 2 new BuddyBoss vulnerabilities
FC
Jan 10
3 min
Notes from a Pentester: CVE-2021-43333 (DataLogic Devices)
FC
Dec 16, 2021
3 min
How to Build Your Own Log4Shell Demo (CVE-2021-4428)
FC
Dec 13, 2021
6 min
Explaining Log4Shell in Simple Terms
FC
May 17, 2021
2 min
CVE-2021-29203 (HP Edgeline Manager) - Explained
Jessica Barker
Apr 23, 2021
4 min
Discussing Deepfakes on BBC Radio
FC
Dec 17, 2020
3 min
Cygenta Cyber Security Foundations Challenge
FC
Aug 12, 2020
2 min
What is APT28's Drovorub Malware?
FC
Aug 2, 2020
5 min
A Case Study in Technical Debt: why DynamoDB might not be for you
FC
Jul 12, 2020
2 min
CyberUp: Why We Believe the Computer Misuse Act Needs Reform
FC
May 17, 2020
3 min
Scraping DNS records with BlueDanube
FC
Jan 28, 2020
4 min
Cache Me Outside how bout dat?
FC
Jan 15, 2020
4 min
The First Official NSA Exploit (CVE-2020-0601)
FC
Nov 26, 2019
4 min
Trust but verify (your tools)
FC
Sep 12, 2019
4 min
Fast data munging with AWS Athena and S3 Buckets
FC
Aug 22, 2019
4 min
How to build a data warehouse with AWS Redshift
1
2