top of page
Search


Windows Subsystem Under Attack After Warning Dismissed
The case serves as a perfect example of when theoretical attack scenarios and proof-of-concepts developed by researchers go unheeded.

Wembley Partners
Dec 21, 20215 min read
112 views
0 comments


Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.

Wembley Partners
Dec 17, 20214 min read
126 views
0 comments


Windows Attack Vectors Under The Microscope
The scope of this article is to examine some of the tools and vulnerabilities threat actors are using to exploit Windows OS.

Wembley Partners
Nov 15, 20216 min read
288 views
0 comments


Bug Bounty Program: When Businesses Collaborate With Hackers
To a hacker, there is no greater opportunity than to hack what is thought to be unhackable.

Wembley Partners
Nov 11, 20214 min read
50 views
0 comments


Defenseless Vulnerabilities: The Ultimate Incident Response Challenge
One of the problems with zero-day exploits is the fact they are often capable of slipping past firewalls.

Wembley Partners
Nov 9, 20215 min read
39 views
0 comments


DNS Spoofing Attacks And How To Protect Yourself
Often, the victim of a cyberattack has no idea they've been compromised until much later. DNS spoofing is a good example of such exploits.

Wembley Partners
Sep 22, 20214 min read
209 views
0 comments


Exploits Into Wireless Security Explained
Anticipating all the possible network entry points that can be exploited by a cybercriminal is a tall ask. Here, we explore WPS security.

Wembley Partners
Sep 10, 20214 min read
110 views
1 comment


Automated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of Automation
What if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.

Wembley Partners
Aug 12, 20215 min read
152 views
0 comments


iOS Wireless Naming Bug, Click-less Zero-Day & Why Is It Critical To Maintain Updates
Everything these days runs on software, and like most things created by people, it is imperfect. Let's dissect a recent critical iOS issue.

Wembley Partners
Jul 28, 20216 min read
49 views
0 comments


A Former Black Hat's Perspective On The Importance of Incident Response Planning
A former hacker’s perspective on when network guardians are asleep at the wheel during a worst-case scenario.

Wembley Partners
Jul 8, 20215 min read
130 views
1 comment


Penetration Testing Vs Red-Teaming – What’s The Difference?
Penetration Tests and Red Teaming exercises: a common misconception is that these are interchangeable. We're here to clarify.

Wembley Partners
Jun 25, 20213 min read
63 views
0 comments


NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?
Which is the best among the four major cybersecurity and risk management frameworks that foster efficient cyber protection?

Wembley Partners
Jun 18, 20214 min read
6,488 views
0 comments


What is a Threat Intelligence-Led Penetration Test?
How does a Threat Intelligence-led penetration test differ from a conventional one? We explore the differences and the similarities here.

Wembley Partners
Jun 10, 20214 min read
726 views
0 comments


What is a CIS AWS Foundations Benchmark and How is it Useful?
Amazon's CIS AWS Foundations Benchmark is a set of compliance regulations for protecting resources hosted on Amazon Web Services.

Wembley Partners
Jun 2, 20214 min read
45 views
0 comments
bottom of page