Nettitude Uncovers WordPress Vulnerabilities 21 Jul 2015 Nettitude has recently observed multiple attacks utilising existing and known vulnerabilities in the WordPress blogging and publishing platform. Read more
'Panda Security 2016 Home User' privilege escalation 5 Apr 2016 All Panda Security 2016 home user products for Windows are vulnerable to privilege escalation, CVE-2015-7378, which allows a... Read more
McAfee File Lock Driver - Kernel Memory Leak 26 Jan 2016 McAfee File Lock Driver does not handle correctly IOCTL_DISK_VERIFY IOCTL requests, which leads to kernel memory leak through... Read more
HMRC Phishing Scam 29 Jan 2016 In the last few days, Nettitude’s threat intelligence platform has picked up a mass phishing campaign – involving... Read more
ZeroPress - A WordPress Vulnerability Hunter 16 Sep 2016 Finding WordPress plugin vulnerabilities is like shooting fish in a barrel. Like taking candy from a baby. Like…... Read more
Reducing The Attack Surface: A Human Error Perspective 9 Sep 2015 The efforts required for a successful cyber-attack do not match the efforts that are invested to build a... Read more
Introducing Prowl 5 Jun 2018 Prowl was initially designed as an in house tool to aid engagements where there’s a requirement to capture... Read more
Pony malware two years later 22 Oct 2015 Two years after first gaining notoriety, the Pony Botnet remains very active. The malware is primarily targeted at... Read more
Shellter – A Dynamic Shellcode Injector 25 Jan 2015 Recently, Shellter has been added to the official repository of Kali Linux. This is a very important milestone in the course... Read more
Network Security Monitoring With Bro IDS, TCPDump And MongoDB 1 Apr 2015 Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*