Four stages of the exploit kit infection chain [1]

An analysis of the RIG exploit kit

Over the last few weeks, we have observed an increase of RIG…
Windows Explorer default permissions

Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the latest Windows 10 v1607 Build 14393

We recently discovered a new and quietly released Windows kernel…

From macro to malware - a step by step analysis

We recently received an email which contained a malicious Word…

DerbyCon 2016 CTF Write Up

We've just got back to sunny England after spending a fantastic…

ZeroPress - A WordPress Vulnerability Hunter

Finding WordPress plugin vulnerabilities is like shooting fish…

Rocktastic: a word list on steroids

Bigger isn’t always better, but sometimes it is.  If you need…
NTLM hashes

Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have to be boring

Sometimes, particularly when dealing with a system perimeter, there's…

What is the jailbreak for iOS 9.3.3 actually doing?

Many people who jailbreak their devices are unaware of the vulnerabilities…