The fireeye hack 15 Dec 2020 With the recent hack of FireEye, there have been many questions circulating among cyber security experts and the... Read more
CVE-2020-14418: madCodeHook Library Local Privilege Escalation 1 Dec 2020 Nettitude discovered a vulnerability in the ‘madCodeHook’ third party library which caused a number of security products, including... Read more
CVE-2020-27708: Electronic Arts (EA) Origin - Local Privilege Escalation 3 Nov 2020 We recently assessed the security posture of Electronic Arts Origin Client and discovered a privilege escalation issue that... Read more
Introducing PoshC2 v7.0 20 Aug 2020 There have been some big improvements and new features added to PoshC2 and we’re excited to announce the... Read more
PoshC2 7 Aug 2020 PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral... Read more
How to use docker in your penetration testing endeavours 31 Jul 2020 In the following post, we've sat down with Kirk Hayes; Senior Security Consult in the US, to... Read more
Detecting PoshC2 - Indicators of Compromise 17 Jun 2020 As a counterpart to the release of PoshC2 version 6.0 we are providing a list of some of... Read more
CVE-2019-16384, 85: Cyblesoft Thinfinity VirtualUI - Path Traversal, HTTP... 4 Jun 2020 Nettitude discovered two vulnerabilities within Cyblesoft’s Thinfinity VirtualUI web application. The findings include path traversal and HTTP header... Read more
Introducing PoshC2 v6.0 18 May 2020 We are pleased to release the latest version of PoshC2 – v6.0. Version 6.0 includes a number of significant... Read more
Small handling errors in incident management 13 May 2020 Incident Response, in line with Information Security, is hard. This article looks at common errors based on the... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*