Advise
Virtual Information Security Manager
Cyber Security Maturity Assessment
Incident Response Exercising
Threat Modelling
Privacy Management Maturity Assessment
Phishing Assessments
Supplier Reviews
ISO27001 Gap Analysis
Certify
Cyber Essentials & Cyber Essentials Plus
IOT Cyber Scheme
IASME Cyber Assurance (ICA)
Security Awareness Training
Secarma Certified
Test
Web Application Penetration Testing
Mobile Application Penetration Testing
Infrastructure Penetration Testing
Wireless Penetration Testing
Cloud Penetration Testing
Build Configuration Security Review
Cloud Configuration Security Review
Firewall Configuration Security Review
Vulnerability Scanning
Red Teaming
Resources
Secarma Labs
Industry News
Blogs
Videos
Downloads
Events
IOT and PSTI
Archive
About
Our Company
ACT Framework
Partner with Secarma
Accreditations
Careers
Log in
Get in touch
Log in
Get in touch
Blog
Blog
Videos
Downloads
Secarma Labs
Industry News
Events
March 22 2021
The True Cost of an ICS Attack
For industries running Industrial Control Systems (ICS) the consequences of an
...
Learn more
March 22 2021
Cybersecurity – Where Does the Responsibility Lie?
Cyber-attacks continue to grow and it’s only a matter of time before your
...
Learn more
March 22 2021
GDPR – The Perfect Time to Start Improving Your Cybsersecurity
On 25 May 2018, the General Data Protection Regulation (GDPR) will be
...
Learn more
March 22 2021
ExploitDev: WOOCOMMERCE PHP Object Injection
RIPS published details for a PHP object injection vulnerability affecting
...
Learn more
March 22 2021
Using NetBeans GUI Designer to Make Pretty Burp Extenders
In this tutorial I will provide you with a straightforward process that will
...
Learn more
March 22 2021
Using Machine Account Passwords During an Engagement
Introduction Of the many advancements in red teaming over the last 12 months,
...
Learn more
March 22 2021
Uploading Files to RDP, NVC, or Anywhere You Can Type
RDPUpload is a tool which implements an old technique for uploading files in
...
Learn more
March 22 2021
SSRS Attacks Part 2 – Building an Empire
In part 1, we looked at dynamically extracting table data from a compromised
...
Learn more
March 22 2021
SSRS Attacks Part 1 – Dynamic Data Extraction
SQL Server Reporting Services (SSRS) is a reporting engine designed to allow
...
Learn more
March 22 2021
SoHopelessly Broken 0-day Strategy
In July we sent 4 of our team to Defcon with the intention of tackling whatever
...
Learn more
March 22 2021
Setting Service Principal Names to Roast Accounts
As a continuation of our previous post, we wanted to discuss another technique
...
Learn more
March 22 2021
Pandwarf in a KALI VM on a Windows Host
Secarma are getting more requests from customers for product reviews, radio
...
Learn more
1
2
3
4