TL;DR Introduction In the field of maritime cyber, we often cite the movie Speed 2: Cruise Control from 1997 as an ...
TL;DR Introduction It’s strange how satisfying it is to turn off the lights, set up a tent under the stars, and watch the ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails Everyone is implementing AI chatbots to ...
The Internet of Things (IOT); that huge network of everyday objects that can connect to the internet; able to “talk” to other devices and send information. Did you know your TV could be spying on you?
Join Spencer Kelly and Ken Munro for a special Cybersecurity Awareness Month briefing on the biggest threats facing ...
The Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) is a big-selling family hybrid SUV. It has an electric range of up to 30 miles or so plus petrol range of another 250ish miles. We ...
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
When we carry out security assessments in Operational Technology (OT) and Industrial Control System (ICS) environments, one thing that often stands out is the use of dual-homed devices. In this blog ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
Last year, about the time we were messing around with a virtually unheard-of hardware wallet we got a bit excited about the word “unhackable”. Long story short, I ended up supporting a selection of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results