Resources

Navigating an evolving threat: your best defence against ransomware
Best Practice Security  |  Blog  |  Uncategorised

Navigating an evolving threat: your best defence against ransomware

One of the most pervasive threats to organisations today is that of ransomware. Modern security wisd...

Attackers, Defenders, and a Referee: Understanding Red and Blue Team exercises
Blog  |  Penetration Testing  |  Red Team

Attackers, Defenders, and a Referee: Understanding Red and Blue Team exercises

In the realm of cybersecurity, a red team exercise serves as a comprehensive assessment of an organi...

A guide to cyber security good practice
Best Practice Security  |  Blog  |  News

A guide to cyber security good practice

Cybersecurity is one of the most important concerns for businesses and individuals in the digital ag...

Reducing The Indicators of Compromise (IOCs) on Beacon and Team Server
Blog

Reducing The Indicators of Compromise (IOCs) on Beacon and Team Server

Most red teamers should already be aware that it is no longer as easy as it used to be to evade dete...

How to protect your business from ransomware attacks
Blog  |  Cyber Essentials

How to protect your business from ransomware attacks

Modern ransomware attacks are becoming increasingly complex and can have catastrophic effects on org...

An expert view on the modern ransomware cyber attack
Blog  |  Cyber Essentials  |  Malware  |  Network Security

An expert view on the modern ransomware cyber attack

As a growing concern, ransomware continues to evolve in complexity, finding new ways to damage indiv...

A practical guide to bypassing userland API Hooking
Blog  |  Uncategorised

A practical guide to bypassing userland API Hooking

During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...

Staff Turnover Risk
Best Practice Security  |  Blog

Staff Turnover Risk

In a time of high staff turnover, do you need to be worried about security Joiners and leavers are n...

Parallels RAS Username Enumeration Flaw
Blog

Parallels RAS Username Enumeration Flaw

CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...

CPMap – identify and exploit SQL Injection vulnerabilities in Android Content Providers.
Blog

CPMap – identify and exploit SQL Injection vulnerabilities in Android Content Providers.

A new tool to find and exploit SQL Injection vulnerabilities in Android Content Providers CPMap is a...

Local SQL Injection in Media Storage (com.android. providers.media) version 9 (CVE-2020-0352)
Blog

Local SQL Injection in Media Storage (com.android. providers.media) version 9 (CVE-2020-0352)

Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton.   Su...

It’s Official! Perspective Risk is now part of the Content+Cloud group
Announcements  |  Blog

It’s Official! Perspective Risk is now part of the Content+Cloud group

Back in June 20 we made the announcement that we were part of a new group brand. From today, Perspec...