Resources

Navigating an evolving threat: your best defence against ransomware
Best Practice Security  |  Blog  |  Uncategorised

Navigating an evolving threat: your best defence against ransomware

One of the most pervasive threats to organisations today is that of ransomware. Modern security wisd...

Attackers, Defenders, and a Referee: Understanding Red and Blue Team exercises
Blog  |  Penetration Testing  |  Red Team

Attackers, Defenders, and a Referee: Understanding Red and Blue Team exercises

In the realm of cybersecurity, a red team exercise serves as a comprehensive assessment of an organi...

A guide to cyber security good practice
Best Practice Security  |  Blog  |  News

A guide to cyber security good practice

Cybersecurity is one of the most important concerns for businesses and individuals in the digital ag...

Reducing The Indicators of Compromise (IOCs) on Beacon and Team Server
Blog

Reducing The Indicators of Compromise (IOCs) on Beacon and Team Server

Most red teamers should already be aware that it is no longer as easy as it used to be to evade dete...

How to protect your business from ransomware attacks
Blog  |  Cyber Essentials

How to protect your business from ransomware attacks

Modern ransomware attacks are becoming increasingly complex and can have catastrophic effects on org...

An expert view on the modern ransomware cyber attack
Blog  |  Cyber Essentials  |  Malware  |  Network Security

An expert view on the modern ransomware cyber attack

As a growing concern, ransomware continues to evolve in complexity, finding new ways to damage indiv...

A practical guide to bypassing userland API Hooking
Blog  |  Uncategorised

A practical guide to bypassing userland API Hooking

During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...

Staff Turnover Risk
Best Practice Security  |  Blog

Staff Turnover Risk

In a time of high staff turnover, do you need to be worried about security Joiners and leavers are n...

MSSQL Practical Injection Cheat Sheet
Penetration Testing

MSSQL Practical Injection Cheat Sheet

Following on from my MySQL Injection Practical Cheat Sheet here is the MSSQL version. As before, I...

MySQL SQL Injection Practical Cheat Sheet
Application Security

MySQL SQL Injection Practical Cheat Sheet

There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provi...

New year, new site, same excellent IT support from Mirus IT
Announcements

New year, new site, same excellent IT support from Mirus IT

Nearly 18 months ago, we were delighted to welcome Mirus IT to Content+Cloud family, as our centre o...

Parallels RAS Username Enumeration Flaw
Blog

Parallels RAS Username Enumeration Flaw

CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...