As a Pentester, I often find myself attempting to identify, (a.k.a. shamelessly steal/adapt people's research) new and intuitive ways to gain access and persistence on Windows endpoints without triggering the AV. My current go-to being a combination of shellcode injection and cobbr's Covenant C2. However, one of the main drawbacks of these frameworks is their limited, or complete lack of, applicable stagers for OSX.
During the online session Eric Kokonas, MTR Senior Product Marketing Manager, and Mat Gangwer, MTR Technical Director, reviewed the threat landscape, explained how MTR fits in an organisation’s cybersecurity strategy and provided an overview of the service.
We interviewed Peter Mackenzie, Incident Response Team Leader at Sophos, and Jez Turner, Cybersecurity Sales Director at Chess, about the new service by Sophos. Watch the video today.
2019's seen significant advances in technology, in a digital landscape that's evolving rapidly.
Here’s a round-up of just some of the technology issues, events and challenges that have characterised the year.
Did you miss SecureTour or want to refresh your memory? Watch the technical demonstration from SecureTour, now available online.
Dave Barnett, Head of CASB at Forcepoint, shares the lessons he has learned from over 80 customer implementations of CASB technology – the good, the bad and the downright ugly.
Watch the highlights from our SecureTour 2019: Cybersecurity Collaboration
Windows 10 has a huge number of features which continues to grow larger with each new update from Microsoft.
In this video, I’ll go over 5 great features that you should be using to enhance your overall experience with Windows 10. This will include a few well-known features along with ones that you may have overlooked, forgot about or didn’t know existed.
Malware is a major problem worldwide, but the nature of malware is changing.
Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially when there’s money to be made.
We welcome Jonathan and Fraser from Sophos HQ – they’re with us to discuss if AI can help towards the fight, and what we can do to protect ourselves.
For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.
Are you managing, moving, or planning to move to Amazon Web Services, Microsoft Azure, or Google Cloud Platform? Watch this video to learn more about how you can ensure the security of your data in the cloud.