Visit our Business blog

Contributors

0 0 0

AppSec Europe 2017

Hands-On Web Exploitation with Python

Back in 2015, a colleague and friend asked if I would be interested in teaching a training class...

Read More…
unknownx500

0 0 1

Public Vulnerability Disclosure: How long is too long?

There has been a lot of chatter on social media lately surrounding the topic of public vulnerability disclosure. Doing a quick Google...

Read More…
unknownx500

0 0 0

Red Team Toolkit Essentials

Many types of red team and physical security assessment toolkits are utilized across the industry. Through our experiences in the NTT...

Read More…
unknownx500

0 0 0

Fileless Malware: Memory Forensics Comes into the Light

Recently, fileless malware has shown up in numerous LinkedIn articles, blog posts and research papers. It’s being discussed as the “new”...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.