Dishing – Social Engineering with Deepfake

In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio […]
404: Ep.25 – The one with John Strand
In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.
The one with John Strand
David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.
404: Ep.24 – What is red, blue and purple testing all about?
The average system pen test is not a complete replication of an actual cyber-attack. However, red teaming is. Learn more about red, blue and purple teaming.
What is red, blue and purple testing all about?
Red teaming is an aggressive form of penetration testing, blue teaming is more defensive and purple teaming is a joint red and blue test.
Penetration Tests vs. Vulnerability Assessments
When shopping for security for your networks, several web application terms get thrown around. Due to this, non-technical people such as CEO’s and management may not understand these terms and may make the wrong purchase. When thinking about your digital security, you may think that by having an anti-virus system, a top-end firewall or even […]
Penetration Testing in the Cloud
Prior to the COVID lockdown we were testing more and more cloud deployments. The lockdown seems to have caused a large increase in the number of cloud migrations, probably migrations which were planned but have now been rushed forward. Based on this cloud migration a common conversation we have with clients is this; ‘we don’t […]