Sencode Network Security Audits

Common Network Security Threats

These days, it is no longer a matter of if a business is attacked, but when.... The post Common Network Security Threats appeared first on Penetration Testing UK - Sencode ...
Professionally Evil Fundamentals: Introduction

Linux X86 Assembly – How To Test Custom Shellcode Using a C Payload Tester

Overview In the last blog post in this series, we created a tool to make it easy to build our custom payloads and extract them.  However, what if we want to test ...
Prevention is Better Than Cure: The Ransomware Evolution

Prevention is Better Than Cure: The Ransomware Evolution

Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of COVID-19, research by IBM found that ransomware incidents ‘exploded’ ...

Low Hanging Fruit Ninja: Slashing the Risks of the Human Element

A long time ago in a galaxy far, far away, I was not a Security Consultant.  I was a Chef.  And I worked as a corporate Chef for an organization that required ...
Free Coventry University Course to Help Everyone Protect their Online Privacy

Free Coventry University Course to Help Everyone Protect their Online Privacy

| | DPA, free, GDPR, Privacy, training
Now everyone can learn what privacy means, how your privacy is impacted when using the web and mobile apps, and how to protect your privacy online thanks to a free course from ...
A New Consultant’s 1st Con – Wild West Hackin Fest – Way West 2021

A New Consultant’s 1st Con – Wild West Hackin Fest – Way West 2021

Last month, I found myself Googling: Is weed legal in Nevada?  This was the day after arriving in Reno for Wild West Hacking Fest – Way West 2021.  I kept noticing that ...
PCAP in the mornining

Network Forensics Classes for EU and US

We have now scheduled two new live online classes, one in September and one in October. The September class is adapted to European time and the October one is adapted to American ...
Professionally Evil Fundamentals: Introduction

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload

Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 assembly.  While this can help us learn x86 assembly, it isn’t viable as a ...
How Gamification is Changing Cybersecurity

How Gamification is Changing Cybersecurity

Gamification is changing cybersecurity and the way we learn! Scott Wright, Co-host and CEO of Click Armor, joins us this month to discuss why gamification is a “game” changer in our industry ...

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. They must ...