“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
Expert Intel
Microsoft Roundup – April 2024
Over the last month, Microsoft has rolled out a series of significant updates that are helping to reshape how businesses use their software and secure their digital environments.
As ever, Microsoft continues to launch new products and make changes to existing software - so our Technical Director Alex, has distilled his favourite April updates and this month provides us with a roundup of his top three takeaways...
Read MoreMicrosoft Roundup – April 2024Choosing your MSP: Critical Questions you should be asking your Managed Service Provider
In an ever-changing tech landscape, a strong partnership with a Managed Service Provider (MSP) can be the cornerstone of a business's success.
Want to know what you should be looking for from your MSP? Here are my Top 10 areas you should be looking at.
Read MoreChoosing your MSP: Critical Questions you should be asking your Managed Service ProviderGootkit Malware Exploit
At Stripe OLT, our analysts face new challenges every day, and occasionally, we come across something noteworthy - recently at Stripe OLT, our team encountered a Gootkit malware exploit in one of our client's systems. Our SOC lead, Sam B, takes us through the encounter.
Read MoreGootkit Malware ExploitThe importance of proper filtering within web applications
Many times, during software security testing (penetration tests), whitelisting and blacklisting are encountered, with testers trying to bypass the regex (regular expression). But, what is the actual process of identifying these characters that can bypass filters? How are new payloads formed? If you're looking for some technical, offensive security insights, you've come to the right place...
Read MoreThe importance of proper filtering within web applicationsNavigating the Web of Malvertising: Understanding Twisted Spider Group
According to the World Economic Forum (WEF), cybercrime has emerged as the world's third-largest economy, trailing only the United States and China.
Read MoreNavigating the Web of Malvertising: Understanding Twisted Spider GroupMicrosoft Ignite – November 2023 Roundup
This isn’t supposed to be a sales pitch about Business Premium, but an insight to how the single pane of glass approach can both fortify your company’s security posture while also being a win for the financial chart enjoyers.
Read MoreMicrosoft Ignite – November 2023 RoundupYour password doesn’t meet the complexity requirements.
Taking an up to date approach, when it comes to password policies, doesn't have to be complex... Utilising Entra ID, our Microsoft expert Lewis, will take you through his latest recommendations.
Read MoreYour password doesn’t meet the complexity requirements.QR code phishing detection – A theoretical proof of concept using the Microsoft Graph API
Attackers are increasingly utilising QR codes in their phishing campaigns because they don’t just evade standard detection, they are incredibly difficult to detect without some significant effort.
Read MoreQR code phishing detection – A theoretical proof of concept using the Microsoft Graph APICVE-2023-42439: SSRF Vulnerability
A CVE (Common Vulnerabilities and Exposures) is a standardised identifier for a specific security vulnerability in a software application, hardware device, or system. Our pen tester Toby takes you through this latest discovery - CVE-2023-40017.
Read MoreCVE-2023-42439: SSRF VulnerabilitySign up for the latest news and Podcasts
Keep Up with the experts,