News

TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
Done properly, digital forensic investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of digital forensics ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
Vulnerability Advisory Time Travel Debugging: finding Windows GDI flaws Symeon Paraschoudis 10 Oct 2018 29 Min Read ...
Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong ...
Introduction The International Association of Classification Societies (IACS) have introduced two new Unified Requirements (UR); E26 “Cyber resilience of ships” and E27 “Cyber resilience of on-board ...
Aviation Cyber Security Security Blog DEF CON 28: Introduction to ACARS Alex Lomas 10 Aug 2020 19 Min Read ...