LRQA Nettitude Blog

Windows Inline Function Hooking

Posted by Tom Wilson on Mar 18, 2015

Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function calls that a malicious program is making.

Read More

Topics: Security Blog, Uncategorized

DLL Injection: Part Two

Posted by Tom Wilson on Mar 4, 2015

In a previous blog post I gave a high level overview of DLL injection, what it is used for and how it might be achieved.

Read More

Topics: Security Blog, Uncategorized

DLL Injection: Part One

Posted by Tom Wilson on Feb 25, 2015

A High Level Overview

Read More

Topics: Security Blog, Uncategorized

Traditional Wireless Vs. Cloud Wireless Solutions

Posted by Indy Sogi on Feb 19, 2015

In this blog post, I will discuss how a cloud-based architecture makes wireless local area network (LAN) easier and more affordable compared with traditional wireless LAN architecture.

Read More

Topics: Security Blog, Uncategorized

A Beginners’ Guide to Obfuscation

Posted by Sam Baker on Feb 11, 2015

Obfuscation is a technique used to change software code in order to make it harder for a human to understand. There are several reasons one might obfuscate code:

Read More

Topics: Security Blog, Uncategorized

Bypassing AV The Easy Way

Posted by Jules Pagna Disso and Tom Wilson on Dec 11, 2014

During the recent BSIDES conference (2014), which was hosted in Las Vegas, Kyle Adams presented on "Evading code emulation: Writing ridiculously obvious malware that bypasses AV":

Read More

Topics: Security Blog, Uncategorized

eBay Hit By Cross-Site Scripting (XSS) Attack

Posted by Media marketing on Sep 18, 2014

eBay is in the headlines once again this week as the online auction site has reportedly been compromised by a cross-site scripting (XSS) attack, in which users were redirected to a spoof site designed to steal their credentials.  This latest attack follows an announcement from the company back in May urging its users to change their passwords after one of its databases containing encrypted passwords and other customer data had been compromised via a “small number of employee log-in credentials, allowing unauthorised access to eBay’s corporate network”.

Read More

Topics: Security Blog, Uncategorized

Nettitude Achieves ‘6 Star’ Penetration Testing Accreditation

Posted by Media marketing on Sep 1, 2014

Nettitude has added another string to its penetration testing bow today, following confirmation from CREST – the not-for-profit organisation that serves the needs of the technical information security marketplace – that our testing team has successfully achieved full CREST STAR (Simulated Target Attack & Response) status. STAR is arguably one of the most sophisticated approaches for delivering penetration testing. Through combining comprehensive threat data with a “Red Team” style of testing, STAR assessments are designed to deliver some of the strongest levels of assurance available to organisations across the globe.

Read More

Topics: CREST, Nettitude, News, Penetration Testing, Uncategorized

What Is APT Testing?

Posted by Jack Howey on Jun 24, 2014

Not your average test

Read More

Topics: Security Blog, Uncategorized

Why You Cannot Afford To Ignore 2-Factor Authentication

Posted by Ashleigh Buckingham on Jun 19, 2014

Compromised credentials can render even the best security solutions obsolete, and can lead to often unnoticed security breaches.

Read More

Topics: Security Blog, Uncategorized

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all