OUR LATEST RESEARCH
The Ashley Madison Saga Continues
On July 15th news articles began to appear, claiming that the one of the world’s most controversial online dating sites “Ashley Madison” had been compromised. As the story developed, more information became available including a [...]
Nettitude Uncovers WordPress Vulnerabilities
Nettitude has recently observed multiple attacks utilising existing and known vulnerabilities in the WordPress blogging and publishing platform. The issue, described in the accompanying threat advisory, allows an attacker whom is able to post content [...]
Fuzzing with American Fuzzy Lop (AFL)
In a previous entry we gave a brief introduction to the concept of fuzzing and why we use it. In this entry we’ll guide you through using a fuzzer on Linux to help identify bugs [...]
VMware Multiple Products – Privilege Escalation
CVE-2015-3650 Introduction This article summarises the findings and the impact of a vulnerability that we recently discovered in three major VMware Windows products. The affected products are ‘VMware Workstation’, ‘Horizon Client’ (with Local Mode Option), [...]
The Problem of Data Loss Intelligence
Data Loss Intelligence (DLI) concerns the information that is available to you when your data has been compromised. It’s distinct from Data Loss Protection (DLP) technologies, which are more concerned with preventing your data being [...]