LRQA Nettitude Blog

QNAP Android: Don't Over Provide

Posted by Mark Woods on Jun 7, 2016

TL;DR

Read More

Topics: Security Blog, Uncategorized

The PCI DSS Comes of Age - v3.2

Posted by Gavin Buckton on Apr 29, 2016

What impact will the latest version of the PCI DSS have on your organisation?

Read More

Topics: Security Blog, Uncategorized

Exploiting a Kernel Paged Pool Buffer Overflow in Avast Virtualization Driver

Posted by Kyriakos Economou on Feb 17, 2016

CVE-2015-8620

Read More

Topics: Security Blog, Uncategorized

CVE-2015-5243 phpWhois Remote Code Execution

Posted by Iain Wallace on Dec 8, 2015

Malicious input can come from unexpected places.

Read More

Topics: Security Blog, Uncategorized

Malware Manual Unpacking - [Custom + UPX]

Posted by Kyriakos Economou on Oct 5, 2015

SHA-1: 1E6CF952D9F0D507A6AA98AD2B3327B83702BC17

Read More

Topics: Security Blog, Uncategorized

CVE-2015-5227: Zeropress and Remote Code Execution in the WordPress Landing Pages Plugin

Posted by Iain Wallace on Sep 30, 2015

Finding WordPress plugin vulnerabilities is like shooting fish in a barrel.

Read More

Topics: Security Blog, Uncategorized

Rocktastic

Posted by Neil Lines on Sep 23, 2015

People and Passwords
Passwords, passwords, passwords. I talk about them, I think about them; I go crazy over them!

Read More

Topics: Security Blog, Uncategorized

Easy Compliance – The PCI Pills

Posted by Nigel Gildea on Sep 16, 2015

PCI-DSS is a mostly technical set of controls that are applicable to any organisation which stores, processes or transmits credit card data or anything that could affect the security of the card data. It is written by the PCI security standards council (PCI-SSC), mandated by the card brands (Visa, MasterCard, etc.) and enforced by the banks.

Read More

Topics: Security Blog, Uncategorized

Cyber Fighting Power – Who Has The Upper Hand?

Posted by Ben Densham on Sep 3, 2015

Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in the context of cyber warfare got me thinking. How could a traditional approach from a historically renowned army be applied to the cyber world? Cyber, or the internet - if we remove the hyped buzz word - has been described as the fifth military domain after land, sea, air and space, and is certainly at the forefront of the attacks reported in the media these days.

Read More

Topics: Security Blog, Uncategorized

Fuzzing with American Fuzzy Lop (AFL)

Posted by Adam Williams on Jul 14, 2015

In a previous entry we gave a brief introduction to the concept of fuzzing and why we use it. In this entry we’ll guide you through using a fuzzer on Linux to help identify bugs and vulnerabilities in Linux’s main archiving application “tar”.

Read More

Topics: Security Blog, Uncategorized

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all