End-Of Life Software

All software goes through a support cycle, starting at mainstream support, extended support and finally “End of Life”. When software is in mainstream support, provider regularly releases features and provides security updates for any bugs that are present. This support usually occurs when the software is first released and continues for the longest duration. In[…]

Bug Bounty

Open-Source Penetration Testing

With the enormous rise in Cyber Security threats online, many companies are at threat of their online databases being targeted and breached or are even susceptible to attackers defacing their website or using it to compromise visitors’ devices by using the website as a platform to deploy malicious software. This increase in online threats has[…]


Pharming attacks

Pharming is essentially a phishing scam that can infect numerous users simultaneous by redirecting them from a legitimate website to a fake site. The fake website can be used to install virus’s or trojans on the user’s computer to obtain personal information such as bank account details which could be utilised for identity theft. Pharming[…]


Attack Library: Clickjacking

This week the Attack Library mini-series will focus on Clickjacking attacks – what they are, and how to defend against them. A Clickjacking Attack, also known as a UI (User Interface) Redress Attack, is used by malicious threat actors to trick users into being redirected or submitting information without their consent or knowledge. To perform[…]

ransomware picture

Attack Library: Malware

Malware, also known as malicious software is an umbrella term that encompasses any malicious program or file that attempts to harm your computer, often by taking partial control over a device’s operation. There are a number of different types of malware, and these can be explained individually in more thorough detail. The first of these[…]


Password Security

Passwords are currently the most common authentication method used online today. While biometric alternatives are slowly gaining popularity, this is still not enough to replace passwords entirely. The primary objective of hackers is to try and retrieve your login credentials by using various password attacks. The first of these attacks is a brute force attack[…]