Skip content

161 170 194 results

Filter by

  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Vulnerability discovered in unsupported Cisco Systems VPN Client

    An alternative, but no less accurate title to this article would be ‘why you shouldn’t stick with...

    Read more
  • CVE-2015-5227: zeropress and remote code execution in the Wordpress...

    CVE-2015-5227: Zeropress and Remote Code Execution in the Wordpress Landing Pages Plugin

    Read more
    LRQA logo on navy background
  • Rocktastic

    To a penetration tester, passwords are very interesting. They are often simple dictionary words and they can tell...

    Read more
    LRQA logo on navy background
  • Reducing The Attack Surface: A Human Error Perspective

    The efforts required for a successful cyber-attack do not match the efforts that are invested to build a...

    Read more
  • Cyber Fighting Power – Who Has The Upper Hand?

    Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in...

    Read more
  • Cyber fighting power - who has the upper hand?

    Cyber Fighting Power, Who Has The Upper Hand?

    Read more
    LRQA logo on navy background
  • The Ashley Madison Saga Continues

    On July 15th news articles began to appear, claiming that the one of the world’s most controversial online dating...

    Read more
  • Nettitude Uncovers WordPress Vulnerabilities

    Nettitude has recently observed multiple attacks utilising existing and known vulnerabilities in the WordPress blogging and publishing platform.

    Read more
  • Fuzzing with American Fuzzy Lop (AFL)

    In a previous entry we gave a brief introduction to the concept of fuzzing and why we use...

    Read more
    LRQA logo on navy background

Error

Error

No results found

No results found that match your query

Loading results