BLE Vulnerability Leads to Broken Authentication and Malicious Data TransferBLE Vulnerability Leads to Broken Authentication and Malicious Data Transfer

BLE Vulnerability Leads to Broken Authentication and Malicious Data Transfer

5 years ago

A successful Bluetooth Low Energy Spoofing Attack (BLESA) allows threat actors to connect with a device (by getting around reconnection…

What to Include in Your Security Testing Supplier’s AgreementWhat to Include in Your Security Testing Supplier’s Agreement

What to Include in Your Security Testing Supplier’s Agreement

5 years ago

A successful penetration test requires good preparation with an airtight service-level contract between the customer and a supplier that helps…

Cyber Security After COVID-19: How to Protect Your BusinessCyber Security After COVID-19: How to Protect Your Business

Cyber Security After COVID-19: How to Protect Your Business

5 years ago

What is cyber security after COVID-19? We have now passed the stage of emergency policies and procedures being implemented, new…

Top Security Breaches that have Zoomed into 2020 Thus FarTop Security Breaches that have Zoomed into 2020 Thus Far

Top Security Breaches that have Zoomed into 2020 Thus Far

5 years ago

We have all seen how fast things can change in 2020 but the one thing that has not changed is…

File Manager Plugin in WordPress Contains a Remote Code Execution VulnerabilityFile Manager Plugin in WordPress Contains a Remote Code Execution Vulnerability

File Manager Plugin in WordPress Contains a Remote Code Execution Vulnerability

5 years ago

WordPress’ popular plugin File Manager (versions 6.0-6.8) contains a vulnerability that allows an attacker to upload files and execute commands.…

Why Minimising Your Attack Surface is CrucialWhy Minimising Your Attack Surface is Crucial

Why Minimising Your Attack Surface is Crucial

5 years ago

With every security test, Risk Crew has performed, there has been at least one attack surface that can vary in…

Multiple Vulnerabilities found in Microsoft Azure SphereMultiple Vulnerabilities found in Microsoft Azure Sphere

Multiple Vulnerabilities found in Microsoft Azure Sphere

5 years ago

Microsoft Azure Sphere versions 20.07 and 20.06 contain vulnerabilities such as remote code execution and privileges escalation. This could allow…

5 Items to Consider When Choosing a Pen Test Provider5 Items to Consider When Choosing a Pen Test Provider

5 Items to Consider When Choosing a Pen Test Provider

5 years ago

As security professionals with nearly two decades in the industry, we understand the significance of choosing the right penetration testing…

NHS Test and Trace Verifies the Importance of DPIAsNHS Test and Trace Verifies the Importance of DPIAs

NHS Test and Trace Verifies the Importance of DPIAs

5 years ago

The NHS Test and Trace Programme leaves no doubt that it involves the processing of personal data on a large…