top of page
Search

Wembley Partners
Dec 21, 20215 min read
Windows Subsystem Under Attack After Warning Dismissed
The case serves as a perfect example of when theoretical attack scenarios and proof-of-concepts developed by researchers go unheeded.
112 views
0 comments

Wembley Partners
Dec 17, 20214 min read
Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.
126 views
0 comments

Wembley Partners
Nov 15, 20216 min read
Windows Attack Vectors Under The Microscope
The scope of this article is to examine some of the tools and vulnerabilities threat actors are using to exploit Windows OS.
288 views
0 comments

Wembley Partners
Nov 11, 20214 min read
Bug Bounty Program: When Businesses Collaborate With Hackers
To a hacker, there is no greater opportunity than to hack what is thought to be unhackable.
50 views
0 comments

Wembley Partners
Nov 9, 20215 min read
Defenseless Vulnerabilities: The Ultimate Incident Response Challenge
One of the problems with zero-day exploits is the fact they are often capable of slipping past firewalls.
39 views
0 comments

Wembley Partners
Sep 22, 20214 min read
DNS Spoofing Attacks And How To Protect Yourself
Often, the victim of a cyberattack has no idea they've been compromised until much later. DNS spoofing is a good example of such exploits.
209 views
0 comments

Wembley Partners
Sep 10, 20214 min read
Exploits Into Wireless Security Explained
Anticipating all the possible network entry points that can be exploited by a cybercriminal is a tall ask. Here, we explore WPS security.
110 views
1 comment

Wembley Partners
Aug 12, 20215 min read
Automated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of Automation
What if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.
152 views
0 comments

Wembley Partners
Jul 28, 20216 min read
iOS Wireless Naming Bug, Click-less Zero-Day & Why Is It Critical To Maintain Updates
Everything these days runs on software, and like most things created by people, it is imperfect. Let's dissect a recent critical iOS issue.
49 views
0 comments

Wembley Partners
Jul 8, 20215 min read
A Former Black Hat's Perspective On The Importance of Incident Response Planning
A former hacker’s perspective on when network guardians are asleep at the wheel during a worst-case scenario.
130 views
1 comment

Wembley Partners
Jun 25, 20213 min read
Penetration Testing Vs Red-Teaming – What’s The Difference?
Penetration Tests and Red Teaming exercises: a common misconception is that these are interchangeable. We're here to clarify.
63 views
0 comments

Wembley Partners
Jun 18, 20214 min read
NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?
Which is the best among the four major cybersecurity and risk management frameworks that foster efficient cyber protection?
6,488 views
0 comments

Wembley Partners
Jun 10, 20214 min read
What is a Threat Intelligence-Led Penetration Test?
How does a Threat Intelligence-led penetration test differ from a conventional one? We explore the differences and the similarities here.
726 views
0 comments

Wembley Partners
Jun 2, 20214 min read
What is a CIS AWS Foundations Benchmark and How is it Useful?
Amazon's CIS AWS Foundations Benchmark is a set of compliance regulations for protecting resources hosted on Amazon Web Services.
45 views
0 comments
bottom of page