-
img

Do NotPetya Panick...

ProCheckUp

Should we all Petya/NotPetya panick? Here's our flashcard with information essentials so far, and first steps to prevent/remediate infection. ....

img

Still Wannacry?

ProCheckUp

In this article Paul Bissette, shares his views on Wannacry, why were so many organisations hit by the ransomware, and the attitudes and prac ....

Simulated Attacks – Do we need them?

ProCheckUp

What is a simulated attack?

This is one of the first questions many organisations find themselves asking. A simulated attac ....

img

Could your SMI service open you up to attacks?

Guy Newman

Scanner tools are good for obtaining copious amounts of information about network exposed systems, and their open ports, but the results still need ....

img

A Case of Failed Anti-forensics

Dimitrios Fragkiskatos

Here at ProCheckUp we have looked at the results of several digital forensics cases that we have been actively involved with and we have conc ....

img

Getting the Best out of Nessus – Part One

Guy Newman

Quite often we come across companies that have security tools available to them which could prove useful for internal security auditing, but often ....

img

IoT and Digital Forensics

Dimitrios Fragkiskatos

With a high level of internet usage within the G7 which includes Canada, France, Germany, Italy, Japan and the United States, the United Kingdom is ....

img
img

DNS-over-HTTPS: Panacea or not?

Guy Newman

The trusted padlock icon on your browser may make you feel all warm and safe whilst browsing and running in incognito mode, but these protections o ....

img

Remote Code Execution on Biometric IoT Devices

Max de Dumast

Biometric devices, which use unique physical features of users to authenticate them, have long been considered by the wider public the ideal ....

img

"Cloudbusters" - How Hackers Access Cloud Data?

Guy Newman

Cloud adoption is still growing steadily, and cloud-based attacks are growing too. Following the early adopters many companies now use some form of ....

img

Dead Security Tech: Browser XSS filters

David Shanahan

Whenever the subject of Cross-Site Scripting (XSS) remediation strategies arise, somebody invariably mentions browsers having inbuilt XSS filters t ....

img

COVID-19 Scams

Edd Jones

The current outbreak of COVID-19 has created a perfect storm for scammers to monetise through fear, false promises and fraud. Since the beginning o ....

img

Working From Home - Top Tips

Edd Jones

Remote working has rapidly grown due to the recent COVID-19 Coronavirus outbreak as well as government advice, so we wanted to pass on some of our ....

img

We Didn't Start The Fire

David Tyler

Consumer grade and Prosumer grade 3D printers are one of the biggest things to happen in Tech for some time, they also have had one of the ....

img

A Modern-Day Gold Rush: Data

Connor Cracknell

Have you ever seen an advert appear on your Facebook or Instagram feed, so specific that you can only accuse your smartphone of listening to your c ....

img

You HAFNIUM to patch Exchange now

ProCheckUp

A recently publicised set of zero-day vulnerabilities are a critical threat to unpatched Exchange servers globally, leading to increasing attacks i ....

img

The Complexities of Password Complexity

Connor Cracknell

We are all human, humans are lazy.

....

img

Gone Phishing...

Cristian Ciomaga

For those non-geek readers out there, phishing, as ‘phishing.org’ defines it, is “a cybercrime in which a target or targets are contacted by email, ....

img

State of Attack: Cyber Warfare in Ukraine

ProCheckUp

You’d need to be living on another planet right now to be completely unaware of what’s currently happening in Ukraine.

....

img

Taking the OSCP? Fear no more...

Cristian Ciomaga

Today’s blog post relates to some resources that might very well complement any Offensive Security student on their path to trying harder and achiev ....

img

Ransomware Threat In 2022

ProCheckUp

Ransomware attacks happened every 11 seconds in 2021, what can we expect in 2022?

....

img

The Return of The Molerats

ProCheckUp

Threat actor Molerats (TA402) is reported to have launched a new phishing campaign with the use of an implant called "NimbleMamba". This Advanced P ....

img

Singapore Banks Attempt To Combat Phishing

Wei Hou Low

Association of Banks in Singapore (ABS) are working closely with The Monetary Authority of Singapore (MAS) to introduce a new set of rules to comba ....

img

Cyber Threat Intelligence

Brendan Yeo

What is the current state of Cyber Threat Intelligence?

....

img

Command Injection in Plain Sight

Cristian Ciomaga

During a recent string of engagements, ProCheckUp discovered a series of remote code execution vulnerabilities in a number of customer applications ....