News

Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
The Women’s Society of Cyberjutsu (WSC) June 2025 webinar ...
TL;DR: This year PTP Cyber Fest had more villages, more speakers, and more chances for people to get involved. Thank you to our partners RiverSafe, Retail & Hospitality ISAC, Automotive ISAC, and the ...
How Tos How to load unsigned or fake-signed apps on iOS George Waterfield 28 May 2025 10 Min Read ...
TL;DR Using dual-homed devices as a segregation tool is not recommended as a security design solution Use dedicated hardware and robust firewalls to segregate networks to limit access to critical ...
TL;DR Restricted View allows users to read files, but not copy, download or print them Attackers will look for ways to circumvent these controls Traditional workarounds include manual transcription, ...
TL;DR Introduction When a data breach hits the news, it’s usually all about the numbers: millions of names, emails, and maybe even credit card details stolen. Sounds serious, right? But here’s the ...