Risk and Advisory Team 2/19/25 Risk and Advisory Team 2/19/25 Advisory Blog Series: HIPAA Security Rule Updates Read More Risk and Advisory Team 8/19/24 Risk and Advisory Team 8/19/24 Advisory Blog Series: Ransomware Readiness Part 2 – What Does it Really Mean to be Ready? Read More Shawn Moyer 8/1/24 Shawn Moyer 8/1/24 Some Thoughts on Worker Ownership Read More Chris Bellows 6/6/24 Chris Bellows 6/6/24 How to Train Your Large Language Model Read More Brandon Perry 4/22/24 Brandon Perry 4/22/24 Hacking Exchange from the Outside In Read More Chris Bellows 2/29/24 Chris Bellows 2/29/24 Scrutinizing the Scrutinizer Read More Jordan Whitehead 12/4/23 Jordan Whitehead 12/4/23 A LibAFL Introductory Workshop Read More Jordan Whitehead 10/31/22 Jordan Whitehead 10/31/22 Symbolic Triage: Making the Best of a Good Situation Read More Bill Carver 8/22/22 Bill Carver 8/22/22 Advisory Blog Series: Ransomware Readiness Part 1 – To Pay or Not to Pay Read More Brandon Perry 7/2/22 Brandon Perry 7/2/22 Researching Crestron WinCE Devices Read More Brandon Perry 3/29/22 Brandon Perry 3/29/22 Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664 Read More Brandon Perry 1/6/22 Brandon Perry 1/6/22 Unauthenticated Remote Code Execution Chain in SysAid ITIL Read More Tom Steele 10/29/21 Tom Steele 10/29/21 Exploring Unified Diagnostic Services with uds-zoo Read More Justin Kennedy 8/18/21 Justin Kennedy 8/18/21 Sophos UTM Preauth RCE: A Deep Dive into CVE-2020-25223 Read More Zach Lanier 5/20/21 Zach Lanier 5/20/21 Le Zeek, C’est Chic: Using an NSM for Offense Read More Chris Bellows 5/6/21 Chris Bellows 5/6/21 CVE-2021-32030: ASUS GT-AC2900 Authentication Bypass Read More Chris Bellows 4/26/21 Chris Bellows 4/26/21 NANDcromancy: Live Swapping NAND Flash Read More Jordan Whitehead 4/15/21 Jordan Whitehead 4/15/21 QEMU and U: Whole-system tracing with QEMU customization Read More Brandon Perry 12/7/20 Brandon Perry 12/7/20 Authenticated RCE in Pydio (Forever-Day) -- CVE-2020-28913 Read More Dionysus Blazakis 11/17/20 Dionysus Blazakis 11/17/20 A Watch, a Virtual Machine, and Broken Abstractions Read More Older Posts
Risk and Advisory Team 2/19/25 Risk and Advisory Team 2/19/25 Advisory Blog Series: HIPAA Security Rule Updates Read More
Risk and Advisory Team 8/19/24 Risk and Advisory Team 8/19/24 Advisory Blog Series: Ransomware Readiness Part 2 – What Does it Really Mean to be Ready? Read More
Jordan Whitehead 10/31/22 Jordan Whitehead 10/31/22 Symbolic Triage: Making the Best of a Good Situation Read More
Bill Carver 8/22/22 Bill Carver 8/22/22 Advisory Blog Series: Ransomware Readiness Part 1 – To Pay or Not to Pay Read More
Brandon Perry 3/29/22 Brandon Perry 3/29/22 Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664 Read More
Brandon Perry 1/6/22 Brandon Perry 1/6/22 Unauthenticated Remote Code Execution Chain in SysAid ITIL Read More
Justin Kennedy 8/18/21 Justin Kennedy 8/18/21 Sophos UTM Preauth RCE: A Deep Dive into CVE-2020-25223 Read More
Chris Bellows 5/6/21 Chris Bellows 5/6/21 CVE-2021-32030: ASUS GT-AC2900 Authentication Bypass Read More
Jordan Whitehead 4/15/21 Jordan Whitehead 4/15/21 QEMU and U: Whole-system tracing with QEMU customization Read More
Brandon Perry 12/7/20 Brandon Perry 12/7/20 Authenticated RCE in Pydio (Forever-Day) -- CVE-2020-28913 Read More
Dionysus Blazakis 11/17/20 Dionysus Blazakis 11/17/20 A Watch, a Virtual Machine, and Broken Abstractions Read More