top of page


Divide and Contain
How do you protect your home network from cyber attacks against your employer? Read our overview of VLANs.
Feb 8, 20225 min read


Notes from a Pentester: How we found 2 new BuddyBoss vulnerabilities
How we discovered two Wordpress plugin vulnerabilities: CVE-2021-43334 and CVE-2021-44692.
Jan 26, 20224 min read


How to Build Your Own Log4Shell Demo (CVE-2021-4428)
A step-by-step guide to building your own Log4Shell demo, with video overview.
Dec 16, 20213 min read


Explaining Log4Shell in Simple Terms
Vulnerabilities are discovered everyday. While some can be serious, most are not so scary that they get everyone in a (justifiable)...
Dec 13, 20216 min read


Internet of Things Device Security
Here it is folks! Week 3 of Cyber Security Awarness Month 2020, Do Your Part. #BeCyberSmart. In our third guidance document of Cyber...
Oct 15, 20202 min read


QR Codes: Top tips for using them securely
Blog post by Dave Mound What is a QR code? With the introduction of the Covid-19 contact tracing app in England and Wales, we're all...
Oct 6, 20204 min read


A Case Study in Technical Debt: why DynamoDB might not be for you
In this industry it can feel challenging to tell others you've made mistakes, but we believe that it's important to show not just the...
Aug 3, 20205 min read


Scraping DNS records with BlueDanube
DNS is the heart of all things on the internet. It is the system that lets us type in amazon.com rather than 176.32.98.166 to do our...
May 18, 20203 min read
bottom of page