by Security Centric, on 10/09/2020 11:17:42 AM

For many businesses who transact online, the holiday season brings with it an increased spend from consumers. For some, it’s their peak earning point of the year. Unfortunately, this increase …

Read Story
Topics:PentestingPenetration Test

by Eddie, on 05/06/2019 7:15:00 AM

Seen above is real source code we got access to in a recent web application penetration test by exploiting security vulnerabilities caused by poor secure coding practice. While inspecting source …

Read Story
Topics:Pentesting

by Security Centric, on 09/04/2019 7:15:00 AM

Overview Injection vulnerabilities are the most common result of mixing user input with system control. An injection vulnerability can have catastrophic results for a system, potentially leading to a full …

Read Story
Topics:FundamentalsPentestingAuthenticationCompromise

by Security Centric, on 29/11/2018 3:02:00 PM

As information security has become more important across organisations, so has the role of an information security leader within organisations. As an information security leader in an organisation, several questions …

Read Story
Topics:InsiderPentestingRed TeamingPhishing

by Eddie, on 05/02/2016 1:59:00 PM

As organisations continue to adopt advancements in information technology and work towards an interconnected world, malicious attackers have not fallen short. The cyber threat landscape has never been more intense, …

Read Story
Topics:PentestingRed TeamingRisk Assessment

Finally, an actionable blog

The purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.

Read about:

  • What mistakes organisations are making (anonymously of course!)
  • What effective actions are available to quickly and economically achieve effective protection (without buying new kit)
  • Trends we're seeing, via our incident response and forensic investigation capabilities
  • And sometimes, just frustrations about what is wrong with cyber :|

Subscribe to Updates