Frontline research, real attack breakdowns, and security intelligence from the field.
No fluff. No vendor noise. Just signal.
A real Nessus scan. A TP-Link router running SSH from 2012. CVSS 9.8. Unauthenticated root access from the internet. Nobody knew. Here's the full breakdown.
A patient connects to your waiting room WiFi and is instantly on the same network as your patient records. Full attack chain included.
SQL injection, broken access control, SSRF — all 10 OWASP vulnerabilities mapped to real attack scenarios against SA practice portals. Code examples and POPIA implications included.
USB hub at the patient's feet. Shared WiFi. Four PCs, one flat network. A dentist and pentester walks through every step — and every fix.
From Flipper Zero to the WiFi Pineapple — the tools professionals use for physical penetration testing are openly available. Here's what each one does and what it means for your security posture.
A fully operational ransomware kit costs less than a cup of coffee. No expertise required. Here's what that means for your practice, your patients, and your POPIA obligations.
The latest LockBit variant is actively targeting EMEA SMEs. Here's the TTPs and how to harden against them before you're next.
No — but not getting one is a serious POPIA risk. From a dentist who pentests: here's exactly what a pentest covers under the Act, and what you still need to do.
Passive recon is free, legal, and devastatingly effective. Here's exactly what we find before any engagement begins.
Lumma, RedLine, Vidar, StealC — they run in memory, steal everything in 60 seconds, and delete themselves. Your MFA won't stop them. Here's why.
7 novel attack techniques — voice cloning, deepfake video, QR phishing, AiTM MFA bypass & more. If your team thinks they can spot a phish, read this first.
78% of common passwords crack in under 1 second. Troy Hunt, Have I Been Pwned, and why your toothbrush analogy might save your practice.
No posts match that query.