Banner insights

We never stand still

Insights, Information and Resources

Constantly learning, evolving and building new ways to keep what matters to you safe.

Search Insights

Cryptocover

February 11 / 2025
Reading Time: 5 minutes

Stop Worrying About The Quantum Apocalypse

1716365829 dora securify 2921058345 768x512

December 3 / 2024
Reading Time: 6 minutes

Threat Led Pen Testing and DORA

Updated Chat bots strike image 768x383

November 27 / 2024
Reading Time: 5 minutes

When chatbots strike

Header Image 1 Cyber Insurance Friend or Foe 768x256

November 19 / 2024
Reading Time: 4 minutes

Cyber insurance – friend or foe?

Tagging 6 Updated north america 768x559

November 4 / 2024
Reading Time: 4 minutes

Enhancing Vulnerability Management with Incenter Tag Filtering

Security Alert1

October 16 / 2024
Reading Time: 2 minutes

CISCO BREACHED DATA POSTED ON DARK WEB FORUMS

Pip Dreams and Security Schemes: Chaos in your Configuration Files

September 18 / 2024
Reading Time: 7 minutes

Pip Dreams and Security Schemes: Chaos in your Configuration Files

Microsoft Patch Tuesday Analysis - September 2024

September 11 / 2024
Reading Time: 6 minutes

Microsoft Patch Tuesday Analysis - September 2024

Microsoft Patch Tuesday Analysis - July 2024

July 11 / 2024
Reading Time: 7 minutes

Microsoft Patch Tuesday Analysis - July 2024

Patch tuesday feb 2024

April 11 / 2024
Reading Time: 5 minutes

Microsoft Patch Tuesday Analysis - April 2024

LLM's behaving badly part 1 - Malware creation

March 15 / 2024
Reading Time: less than 1 minute

LLM's behaving badly part 1 - Malware creation

Purple1

February 19 / 2024
Reading Time: 5 minutes

Purple Teams - The Business Benefits of Cost-Effective Purple Penetration Testing

Patch tuesday feb 2024

February 16 / 2024
Reading Time: 7 minutes

Microsoft Patch Tuesday Analysis - February 2024

Living off the land, an introduction to blending in for red teams

January 25 / 2024
Reading Time: 4 minutes

Living off the land, an introduction to blending in for red teams

Unleashing the Power of Purple teaming with MITRE ATT&CK

January 16 / 2024
Reading Time: 4 minutes

Unleashing the Power of Purple teaming with MITRE ATT&CK

Indicators of compromise 01

January 15 / 2024
Reading Time: 5 minutes

Indicators of Compromise (IOC): Understanding, Identifying, and Utilizing Cyber Threat Indicators

OSINT Detective

January 14 / 2024
Reading Time: 4 minutes

OSINT In Threat Hunting

What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)

October 11 / 2023
Reading Time: 6 minutes

What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)

Child 5976952 1280

September 5 / 2023
Reading Time: 3 minutes

Protecting Education: Cybersecurity's Vital Mission

Zerodaysmall 5

August 31 / 2023
Reading Time: 2 minutes

Will Continuous Penetration Testing lead to more Zero-Days?

Satellite 2771128 1280

August 29 / 2023
Reading Time: 5 minutes

A Threat Model for Space-Based Data Centers

OCCAMSEC SOCIAL POST DISCLOSURE SEAS1

August 10 / 2023
Reading Time: 3 minutes

Navigating The SEC Cybersecurity Risk Management Rules

Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire

August 9 / 2023
Reading Time: 4 minutes

Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire

Security Awareness Training is Mostly Pointless: A Practitioner's Perspective

August 7 / 2023
Reading Time: less than 1 minute

Security Awareness Training is Mostly Pointless: A Practitioner's Perspective

The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers

August 7 / 2023
Reading Time: 3 minutes

The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers

Is the SQL Injection Optional?

June 29 / 2023
Reading Time: 10 minutes

Is the SQL Injection Optional?

Mastering FortiOS Exploitation: No Direct Debugging Required

June 14 / 2023
Reading Time: 5 minutes

Mastering FortiOS Exploitation: No Direct Debugging Required

Iceberg reveal scaled

June 8 / 2023
Reading Time: 4 minutes

Unmasking hidden dangers: The critical need for threat hunting

Incenter banner

June 1 / 2023
Reading Time: 2 minutes

Major Incenter updates cover mobile, API, cloud and more

Exploit for CVE-2023-2825

May 25 / 2023
Reading Time: 3 minutes

Exploit for CVE-2023-2825

Virtual CISO banner

March 22 / 2023
Reading Time: less than 1 minute

Getting Root - A technical walkthrough

Brolly

February 21 / 2023
Reading Time: 4 minutes

Don't put all your faith in cyber insurance

Abstract molecule structure scaled 1

February 6 / 2023
Reading Time: less than 1 minute

Threat Landscape Report - US Healthcare Industry

Once you POP you just can't stop

December 11 / 2022
Reading Time: 12 minutes

Once you POP you just can't stop

Sim Swapping, an overview

November 11 / 2022
Reading Time: 3 minutes

Sim Swapping, an overview

I spy an LFI

September 12 / 2022
Reading Time: 10 minutes

I spy an LFI

A WAF Bypass

June 28 / 2022
Reading Time: 3 minutes

A WAF Bypass

Door opening2

February 23 / 2022
Reading Time: 8 minutes

The Move To Logic Exploitation

OWASP Sept

September 23 / 2021
Reading Time: less than 1 minute

Be better at infosec - OWASP London

Penetration Test or Red Team?

August 17 / 2021
Reading Time: 3 minutes

Penetration Test or Red Team?

Rotten Apples: MacOS Codesigning Translocation Vulnerability

July 29 / 2021
Reading Time: 10 minutes

Rotten Apples: MacOS Codesigning Translocation Vulnerability

Evolving attacks on healthcare in 2020 and Beyond Summary

January 19 / 2021
Reading Time: 4 minutes

Evolving attacks on healthcare in 2020 and Beyond Summary

Screenshot 2021 06 17 at 20 48 58 OWASP London

October 9 / 2020
Reading Time: less than 1 minute

OWASP London/Suffolk Chapter meeting

Establishing a Beachhead

July 30 / 2020
Reading Time: 3 minutes

Establishing a Beachhead

What is the future of commercial drone security?

July 23 / 2020
Reading Time: 4 minutes

What is the future of commercial drone security?

Into the future PTNBSQ3 scaled 1

May 27 / 2020
Reading Time: 4 minutes

A Security Strategy for the New Normal

More secure Zoom use

April 11 / 2020
Reading Time: 4 minutes

More secure Zoom use

Negotiator

March 11 / 2020
Reading Time: 4 minutes

Hostage Negotiation and Cyber Security

Race to cloud

February 28 / 2020
Reading Time: 5 minutes

In the race to the cloud, what could possibly go wrong?

I Stock 1078061882 scaled 1

January 2 / 2020
Reading Time: 3 minutes

Emerging trends in threat actor communication methods

Sarcasm

November 14 / 2019
Reading Time: 2 minutes

The industry guide to being a successful “bad actor”

I Stock 1017747056

October 30 / 2019
Reading Time: 5 minutes

Tales From The Red Team Crypt – Episode 1

Magicians hat scaled

October 1 / 2019
Reading Time: 5 minutes

Everyone can be taught new tricks – considerations for application pen tests

Operating room scaled

September 13 / 2019
Reading Time: 3 minutes

Lessons learned from Healthcare security assessments

Persona image

August 30 / 2019
Reading Time: 2 minutes

LinkedIn Pwnage: why we can’t all be friends

Do better penetration tests – for buyers and testers

June 30 / 2019
Reading Time: 4 minutes

Do better penetration tests – for buyers and testers

MA concept scaled

April 16 / 2019
Reading Time: 2 minutes

M&A Cybersecurity

Media scaled

March 14 / 2019
Reading Time: 4 minutes

Lessons learned from working with media companies