
A practical guide to bypassing userland API Hooking
During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...
During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...
In a time of high staff turnover, do you need to be worried about security Joiners and leavers are n...
Following on from my MySQL Injection Practical Cheat Sheet here is the MSSQL version. As before, I...
There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provi...
Nearly 18 months ago, we were delighted to welcome Mirus IT to Content+Cloud family, as our centre o...
CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...
A new tool to find and exploit SQL Injection vulnerabilities in Android Content Providers CPMap is a...
Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Su...
Back in June 20 we made the announcement that we were part of a new group brand. From today, Perspec...
A Guiding Hand for Organisational Security: Virtual CISO (Chief Information Officer) Summary ...
Working Together to Achieve Global Standards in Security: ISO 27001 Implementation Summary Client: A...