top of page
All Posts

Jul 12, 20202 min read
CyberUp: Why We Believe the Computer Misuse Act Needs Reform
The Computer Misuse Act (1990) is 30 years old and was already out of date before it even got started. It came into effect in the UK...

May 17, 20203 min read
Scraping DNS records with BlueDanube
DNS is the heart of all things on the internet. It is the system that lets us type in amazon.com rather than 176.32.98.166 to do our...

Jan 28, 20204 min read
Cache Me Outside how bout dat?
Many of you will remember our blog post about RIDL, FALLOUT and ZombieLoad back in 2019, hot on the heels of Spectre and Meltdown from...

Jan 15, 20204 min read
The First Official NSA Exploit (CVE-2020-0601)
2020 starts with a shift in cybersecurity and the level of transparency that we usually see from the alphabet agencies. Tuesday the 14th...

Nov 26, 20194 min read
Trust but verify (your tools)
During a recent penetration test for a client we at Cygenta noticed a few odd responses from some of the scans we were doing with a tool...

Sep 12, 20194 min read
Fast data munging with AWS Athena and S3 Buckets
You have a ton of data, gigabytes of it, all in thousands - if not hundreds of thousands - of seperate files. How on earth do you go...


Aug 22, 20194 min read
How to build a data warehouse with AWS Redshift
I've been working on an idea for a while now that needed the ability to store and search through a large amount of data, we are not...

Aug 15, 20194 min read
A different type of phone hacking from 2013
In today's post, we're taking a trip down my social engineering memory lane, to around April 2013, probably a Thursday at about 5pm. Cast...


Jul 21, 20193 min read
What we can learn from APT34 using a fake University of Cambridge LinkedIn profile
Last week, FireEye reported a phishing campaign which they had identified and traced back to the Iranian group APT34. It's an interesting...


May 14, 20193 min read
RIDL, FALLOUT and ZombieLoad
So three(3) new hardware based vulnerabilities were released and whilst we all remember Spectre or Meltdown from last year these ones,...
Apr 17, 20193 min read
What we can learn from the APT34 leak
The Iranian hacking group known as APT34/Oilrig/HelixKitten have had a breach of their own: a dump of the breach has now been made...


Jan 11, 20191 min read
At some point you're probably going to have to do some running
I had a great chat with Carole Theriault about social engineering and how I see cybersecurity for most companies. We covered fishing rods...

Nov 13, 20182 min read
The Problem with SSL/TLS Certificates
**Editors Note: This blog post was written a few months ago. Since the extraordinary number of sites exposed by this flaw, Cygenta tried...
Sep 6, 20182 min read
Check your internet speed from the terminal
At times, it is nice to know that your internet connection is running at the best possible speed. This could be just for bragging rights...
Aug 5, 20183 min read
RFC's?
I have been posting a lot on Twitter recently about RFC's and I get a lot of questions from people about what they are, why they matter...
bottom of page