Resources

Parallels RAS Username Enumeration Flaw
Blog

Parallels RAS Username Enumeration Flaw

CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...

CPMap – identify and exploit SQL Injection vulnerabilities in Android Content Providers.
Blog

CPMap – identify and exploit SQL Injection vulnerabilities in Android Content Providers.

A new tool to find and exploit SQL Injection vulnerabilities in Android Content Providers CPMap is a...

Local SQL Injection in Media Storage (com.android. providers.media) version 9 (CVE-2020-0352)
Blog

Local SQL Injection in Media Storage (com.android. providers.media) version 9 (CVE-2020-0352)

Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton.   Su...

It’s Official! Perspective Risk is now part of the Content+Cloud group
Announcements  |  Blog

It’s Official! Perspective Risk is now part of the Content+Cloud group

Back in June 20 we made the announcement that we were part of a new group brand. From today, Perspec...

Perspective Risk, an IT Lab company, becomes a Content+Cloud company
Announcements  |  Blog

Perspective Risk, an IT Lab company, becomes a Content+Cloud company

At Perspective Risk, whilst we are officially part of the IT Lab group, we are an independently mana...

Local SQL Injection In ‘com.android. providers. telephony’ version 10 (CVE-2020-0060)
Blog

Local SQL Injection In ‘com.android. providers. telephony’ version 10 (CVE-2020-0060)

Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Summary A...

The Coronavirus and Your Organisation’s Cybersecurity
Blog

The Coronavirus and Your Organisation’s Cybersecurity

Seven Things You Can Do to Reduce Your Risks In this time of heightened risk as cybercriminals seek ...

ManageEngine EventLog Analyser Privilege Escalation (CVE-2020-10815)
Blog

ManageEngine EventLog Analyser Privilege Escalation (CVE-2020-10815)

Perspective Risk Discovers Vulnerability in Popular SIEM Product EventLog Analyser is log management...

How To Ensure Your Remote Working Solutions Are Secure
Blog  |  Cyber Essentials

How To Ensure Your Remote Working Solutions Are Secure

Is Remote Working Compromising Your Cybersecurity?  In the understandable rush to enable remote...

New Remote Testing Available, In Response To The Coronavirus
Blog  |  Penetration Testing

New Remote Testing Available, In Response To The Coronavirus

Remote Security Assessments of Internal Systems, Applications and Infrastructure In response to the ...

Cyber Essentials is Changing! What You Need to Know
Blog  |  Cyber Essentials

Cyber Essentials is Changing! What You Need to Know

Get the Lowdown on the Big Changes to the Cyber Essentials Scheme Whether you have a Cyber Essential...

Samsung Dual Messenger Sandbox Escape and Privilege Escalation
Blog

Samsung Dual Messenger Sandbox Escape and Privilege Escalation

TLDR A vulnerability was identified in a Samsung system app which allows external malicious applicat...