Banner insights

We never stand still

Insights, Information and Resources

Constantly learning, evolving and building new ways to keep what matters to you safe.

Search Insights

1716365829 dora securify 2921058345 768x512

December 3 / 2024
Reading Time: 6 minutes

Threat Led Pen Testing and DORA

Updated Chat bots strike image 768x383

November 27 / 2024
Reading Time: 5 minutes

When chatbots strike

Header Image 1 Cyber Insurance Friend or Foe 768x256

November 19 / 2024
Reading Time: 4 minutes

Cyber insurance – friend or foe?

Tagging 6 Updated north america 768x559

November 4 / 2024
Reading Time: 4 minutes

Enhancing Vulnerability Management with Incenter Tag Filtering

Security Alert1

October 16 / 2024
Reading Time: 2 minutes

CISCO BREACHED DATA POSTED ON DARK WEB FORUMS

Pip Dreams and Security Schemes: Chaos in your Configuration Files

September 18 / 2024
Reading Time: 7 minutes

Pip Dreams and Security Schemes: Chaos in your Configuration Files

Microsoft Patch Tuesday Analysis - September 2024

September 11 / 2024
Reading Time: 6 minutes

Microsoft Patch Tuesday Analysis - September 2024

Microsoft Patch Tuesday Analysis - July 2024

July 11 / 2024
Reading Time: 7 minutes

Microsoft Patch Tuesday Analysis - July 2024

Patch tuesday feb 2024

April 11 / 2024
Reading Time: 5 minutes

Microsoft Patch Tuesday Analysis - April 2024

LLM's behaving badly part 1 - Malware creation

March 15 / 2024
Reading Time: less than 1 minute

LLM's behaving badly part 1 - Malware creation

Purple1

February 19 / 2024
Reading Time: 5 minutes

Purple Teams - The Business Benefits of Cost-Effective Purple Penetration Testing

Patch tuesday feb 2024

February 16 / 2024
Reading Time: 7 minutes

Microsoft Patch Tuesday Analysis - February 2024

Living off the land, an introduction to blending in for red teams

January 25 / 2024
Reading Time: 4 minutes

Living off the land, an introduction to blending in for red teams

Unleashing the Power of Purple teaming with MITRE ATT&CK

January 16 / 2024
Reading Time: 4 minutes

Unleashing the Power of Purple teaming with MITRE ATT&CK

Indicators of compromise 01

January 15 / 2024
Reading Time: 5 minutes

Indicators of Compromise (IOC): Understanding, Identifying, and Utilizing Cyber Threat Indicators

OSINT Detective

January 14 / 2024
Reading Time: 4 minutes

OSINT In Threat Hunting

What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)

October 11 / 2023
Reading Time: 6 minutes

What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)

Child 5976952 1280

September 5 / 2023
Reading Time: 3 minutes

Protecting Education: Cybersecurity's Vital Mission

Zerodaysmall 5

August 31 / 2023
Reading Time: 2 minutes

Will Continuous Penetration Testing lead to more Zero-Days?

Satellite 2771128 1280

August 29 / 2023
Reading Time: 5 minutes

A Threat Model for Space-Based Data Centers

OCCAMSEC SOCIAL POST DISCLOSURE SEAS1

August 10 / 2023
Reading Time: 3 minutes

Navigating The SEC Cybersecurity Risk Management Rules

Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire

August 9 / 2023
Reading Time: 4 minutes

Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire

Security Awareness Training is Mostly Pointless: A Practitioner's Perspective

August 7 / 2023
Reading Time: less than 1 minute

Security Awareness Training is Mostly Pointless: A Practitioner's Perspective

The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers

August 7 / 2023
Reading Time: 3 minutes

The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers

Is the SQL Injection Optional?

June 29 / 2023
Reading Time: 10 minutes

Is the SQL Injection Optional?

Mastering FortiOS Exploitation: No Direct Debugging Required

June 14 / 2023
Reading Time: 5 minutes

Mastering FortiOS Exploitation: No Direct Debugging Required

Iceberg reveal scaled

June 8 / 2023
Reading Time: 4 minutes

Unmasking hidden dangers: The critical need for threat hunting

Incenter banner

June 1 / 2023
Reading Time: 2 minutes

Major Incenter updates cover mobile, API, cloud and more

Exploit for CVE-2023-2825

May 25 / 2023
Reading Time: 3 minutes

Exploit for CVE-2023-2825

Virtual CISO banner

March 22 / 2023
Reading Time: less than 1 minute

Getting Root - A technical walkthrough

Brolly

February 21 / 2023
Reading Time: 4 minutes

Don't put all your faith in cyber insurance

Abstract molecule structure scaled 1

February 6 / 2023
Reading Time: less than 1 minute

Threat Landscape Report - US Healthcare Industry

Once you POP you just can't stop

December 11 / 2022
Reading Time: 12 minutes

Once you POP you just can't stop

Sim Swapping, an overview

November 11 / 2022
Reading Time: 3 minutes

Sim Swapping, an overview

I spy an LFI

September 12 / 2022
Reading Time: 10 minutes

I spy an LFI

A WAF Bypass

June 28 / 2022
Reading Time: 3 minutes

A WAF Bypass

Door opening2

February 23 / 2022
Reading Time: 8 minutes

The Move To Logic Exploitation

OWASP Sept

September 23 / 2021
Reading Time: less than 1 minute

Be better at infosec - OWASP London

Penetration Test or Red Team?

August 17 / 2021
Reading Time: 3 minutes

Penetration Test or Red Team?

Rotten Apples: MacOS Codesigning Translocation Vulnerability

July 29 / 2021
Reading Time: 10 minutes

Rotten Apples: MacOS Codesigning Translocation Vulnerability

Evolving attacks on healthcare in 2020 and Beyond Summary

January 19 / 2021
Reading Time: 4 minutes

Evolving attacks on healthcare in 2020 and Beyond Summary

Screenshot 2021 06 17 at 20 48 58 OWASP London

October 9 / 2020
Reading Time: less than 1 minute

OWASP London/Suffolk Chapter meeting

Establishing a Beachhead

July 30 / 2020
Reading Time: 3 minutes

Establishing a Beachhead

What is the future of commercial drone security?

July 23 / 2020
Reading Time: 4 minutes

What is the future of commercial drone security?

Into the future PTNBSQ3 scaled 1

May 27 / 2020
Reading Time: 4 minutes

A Security Strategy for the New Normal

More secure Zoom use

April 11 / 2020
Reading Time: 4 minutes

More secure Zoom use

Negotiator

March 11 / 2020
Reading Time: 4 minutes

Hostage Negotiation and Cyber Security

Race to cloud

February 28 / 2020
Reading Time: 5 minutes

In the race to the cloud, what could possibly go wrong?

I Stock 1078061882 scaled 1

January 2 / 2020
Reading Time: 3 minutes

Emerging trends in threat actor communication methods

Sarcasm

November 14 / 2019
Reading Time: 2 minutes

The industry guide to being a successful “bad actor”

I Stock 1017747056

October 30 / 2019
Reading Time: 5 minutes

Tales From The Red Team Crypt – Episode 1

Magicians hat scaled

October 1 / 2019
Reading Time: 5 minutes

Everyone can be taught new tricks – considerations for application pen tests

Operating room scaled

September 13 / 2019
Reading Time: 3 minutes

Lessons learned from Healthcare security assessments

Persona image

August 30 / 2019
Reading Time: 2 minutes

LinkedIn Pwnage: why we can’t all be friends

Do better penetration tests – for buyers and testers

June 30 / 2019
Reading Time: 4 minutes

Do better penetration tests – for buyers and testers

MA concept scaled

April 16 / 2019
Reading Time: 2 minutes

M&A Cybersecurity

Media scaled

March 14 / 2019
Reading Time: 4 minutes

Lessons learned from working with media companies