A successful Bluetooth Low Energy Spoofing Attack (BLESA) allows threat actors to connect with a device (by getting around reconnection…
A successful penetration test requires good preparation with an airtight service-level contract between the customer and a supplier that helps…
What is cyber security after COVID-19? We have now passed the stage of emergency policies and procedures being implemented, new…
We have all seen how fast things can change in 2020 but the one thing that has not changed is…
WordPress’ popular plugin File Manager (versions 6.0-6.8) contains a vulnerability that allows an attacker to upload files and execute commands.…
With every security test, Risk Crew has performed, there has been at least one attack surface that can vary in…
Microsoft Azure Sphere versions 20.07 and 20.06 contain vulnerabilities such as remote code execution and privileges escalation. This could allow…
As security professionals with nearly two decades in the industry, we understand the significance of choosing the right penetration testing…
The NHS Test and Trace Programme leaves no doubt that it involves the processing of personal data on a large…