TL;DR Why Discord appeals to attackers Discord has become an attractive tool for attackers not because it’s malicious, but ...
Join us for an evening of relaxed networking, conversation, and connection with the local cyber and tech community. OxCyber Socials are designed to bring together cybersecurity professionals, tech ...
We are seeking a DFIR Analyst to join our team, leveraging their technical expertise and investigative mindset to support forensic investigations and incident response engagements. The ideal candidate ...
Join Spencer Kelly and Ken Munro for a special Cybersecurity Awareness Month briefing on the biggest threats facing ...
If you haven’t read the previous posts, I would recommend them as a primer to the devices, BLE and what we’re doing. In part one, we made a low-cost key finder beep by capturing and replaying BLE ...
This is the next post in our Android 101 series. Today we are looking at broadcast receivers. If you are catching up, start with Android services 101 for background components and scheduling, then ...
What is CHECK, when should you use it, and why? CHECK is NCSC’s assurance scheme for penetration testing. It began as a way for government and critical systems to be tested safely, but any ...
Red teaming has always thrived on creativity, unpredictability, and a touch of chaos. But with AI in the mix, both the red (and blue) teams have to work harder to stay ahead. From automated generation ...
Witness firsthand how an AI tool can be compromised in this revealing and practical demonstration. This 30-minute session will move beyond theoretical discussions, showcasing live exploitation ...
Ken Munro is presenting at 11:45 on Track 1: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship. Cruise ships are among the most complex environments you’ll ...