Blog
Analysis and takeaways from our offensive engagements and vulnerability research.
The Rising Stakes of Operational Technology Security
OT environments were not initially designed with security as a priority. As OT environments become increasingly connected to IT infrastructure, and our daily lives become ever more dependent on the smooth, safe running of this technology, ensuring it is deployed, maintained and operated securely is increasingly important.
Another Kind of Technical Debt
As organisations embrace the cost benefits and technical capabilities of automated tools and AI supported security testing, AnchorSec asks what the implications are for the offensive security industry, and the real world security of your IT systems.
Having a Tiff – A Complicated Love Affair with Vulnerability Research
A write-what-where vulnerability was discovered in LibTiff. Here we discuss some of the details of the finding.
A Real-World Take on SANS SEC760
I recently embarked upon a journey through time and space to learn some new things, challenge myself technically and wipe off the rust of a near dead skill I once used to cultivate when cybersec was still a little more space cowboy.