Dishing – Social Engineering with Deepfake

In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio […]

404: Ep.25 – The one with John Strand

In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.

The one with John Strand

David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.

Penetration Tests vs. Vulnerability Assessments

When shopping for security for your networks, several web application terms get thrown around. Due to this, non-technical people such as CEO’s and management may not understand these terms and may make the wrong purchase. When thinking about your digital security, you may think that by having an anti-virus system, a top-end firewall or even […]

Penetration Testing in the Cloud

Prior to the COVID lockdown we were testing more and more cloud deployments. The lockdown seems to have caused a large increase in the number of cloud migrations, probably migrations which were planned but have now been rushed forward. Based on this cloud migration a common conversation we have with clients is this; ‘we don’t […]