
A practical guide to bypassing userland API Hooking
During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...
During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...
In a time of high staff turnover, do you need to be worried about security Joiners and leavers are n...
CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...
A new tool to find and exploit SQL Injection vulnerabilities in Android Content Providers CPMap is a...
Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Su...
Back in June 20 we made the announcement that we were part of a new group brand. From today, Perspec...
At Perspective Risk, whilst we are officially part of the IT Lab group, we are an independently mana...
Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Summary A...
Seven Things You Can Do to Reduce Your Risks In this time of heightened risk as cybercriminals seek ...
Perspective Risk Discovers Vulnerability in Popular SIEM Product EventLog Analyser is log management...
Is Remote Working Compromising Your Cybersecurity? In the understandable rush to enable remote...