Recent blog posts

Cloud Surfing: Riding the Waves of Google Drive Forensics
Renmarc Andrada 18/04/2024

Cloud Surfing: Riding the Waves of Google Drive Forensics

Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...

All posts

Cloud Surfing: Riding the Waves of Google Drive Forensics
Renmarc Andrada 18/04/2024

Cloud Surfing: Riding the Waves of Google Drive Forensics

Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...

CVE-2024-2879 – Critical Vulnerability in WordPress Plugin LayerSlider
Daly Whyte 03/04/2024

CVE-2024-2879 – Critical Vulnerability in WordPress Plugin LayerSlider

Earlier today the critical vulnerability CVE-2024-2879 was announced for the widely used WordPress plugin LayerSlider, affecting versions 7.9.11 - 7.10.0. This vulnerability is an unauthenticated SQL injection with a CVSSv3 score of 9.8 with the likelihood of high impact to data confidentiality and integrity. This post will advise how to...

SBT partners with KHIPU Networks
Melissa Boyle 28/03/2024

SBT partners with KHIPU Networks

We are delighted to announce that we have entered into a strategic partnership with KHIPU Networks, with a view to delivering our training to a whole new network of organisations.

Journey Through Time: Exploring the Evolution of CVSS Over the Years
Joshua Beaman 22/02/2024

Journey Through Time: Exploring the Evolution of CVSS Over the Years

CVSS, or Common Vulnerability Scoring System, is a standardized framework used to assess and communicate the severity of software vulnerabilities. It provides a numerical score representing the vulnerability’s potential impact, helping security professionals and organizations prioritize their responses to different security threats.