+44 (0)203 88 020 88

Menu

Search

penetration testing

10 Common Security Weaknesses and How To Defend Against Them

The mistakes we make and how to fix them – a new report co-authored by the NCSC reveals the 10 most common security weaknesses exploited by hackers. A joint security alert from the National Cyber Security Centre UK (NCSC-UK) was released earlier this month, co-authored by cybersecurity bodies from the USA, Canada, New Zealand, and […]

10 Common Security Weaknesses and How To Defend Against Them Read More »

How Return-Oriented Programming exploits work

Return-Oriented Programming is a security exploit technique used by attackers to execute code on their target system.  By obtaining control of the call stack, the attacker can control the flow of existing trusted software running on the computer and manipulate it to their own ends.  New research published this month has demonstrated how SPECTRE style vulnerabilities

How Return-Oriented Programming exploits work Read More »

0

No products in the basket.

No products in the basket.