News

“Passive [enumeration] methods seem to be very under-appreciated”, and there is a lot to learn from listening to our systems. These were the words of Chris Day, senior consultant at MWR, speaking at ...
Cyber criminals are increasingly becoming more sophisticated in their methods of attack. Often we can equate this to the methods of data exfiltration as well. Exfiltration, or exportation, of data is ...
Most attention goes to keeping hackers out. But once they're inside, how do they extract data from your organization? Research from Trustwave's SpiderLabs shows the answer is often surprisingly simple ...