All posts

Cyber Security DE:CODED – Understanding and Managing Risk

“No one ever thinks it’s going to be them.”

Show notes for series 1, episode 6

In this episode Simon and Marc focus on the basics of understanding and managing risk. They discuss insurance, how to assess the risk of anything (from dropping a cup of tea on an expensive server to animal attacks!) and touch on ransomware.

Continue reading “Cyber Security DE:CODED – Understanding and Managing Risk”
All posts

Cyber Security DE:CODED – Cyber Security First Principles

“A mugger can only attack one person at a time… cybercriminals can defraud thousands of people simultaneously.”

Show notes for series 1, episode 4

In this episode we describe cyber security first principles.

Why can’t we just lock everything up in a safe?

Continue reading “Cyber Security DE:CODED – Cyber Security First Principles”
All posts

Cyber Security DE:CODED – Official Cyber Security Advice

“Changing default settings, wildly and randomly, would achieve the tick”

Show notes for series 1, episode 2

Where can you get cyber security advice that you trust? Are certificates and Standards worthwhile and good value for money? We delve into the world of ‘official’ cyber security advice and give a balanced view on what we recommend.

Continue reading “Cyber Security DE:CODED – Official Cyber Security Advice”
All posts

Cyber Security DE:CODED – How Attackers Attack

Show notes for series 1, episode 1 (How Attackers Attack)

How do attackers attack? Simon and Marc look at their tactics and explore options to help recognise and evade them. They examine social engineering in a cyber security and physical context. And the guys also explore technical exploits. At the end of this episode you will have a great overview of how attackers attack.

Continue reading “Cyber Security DE:CODED – How Attackers Attack”
All posts

Cyber Security DE:CODED – A new cyber security podcast

“Even executives have families and personal lives”

Show notes for series 1, trailer 1

We’re excited to announce De:Coded Cyber, our new cyber security podcast covering security for large businesses, budding CISOs and we recognise that executives are real people too, with families and personal lives.

Continue reading “Cyber Security DE:CODED – A new cyber security podcast”
All posts

What does a breach look like?

Understand what a real hacking attack looks like to the attacker and defenders

breach visualisation

The IT security world is rocked by news of breach after breach, including the shocking disclosure of the SolarWinds attack. Data is stolen, deleted or corrupted and… well you know. It’s a total mess. Journalists focus on basic outcomes, while technical blogs look at esoteric technical details. We’ve explained, in laymen’s terms, what a breach looks like from an attacker’s point of view. And from the position of the defenders.

Continue reading “What does a breach look like?”
All posts

Ransomware evolved – Persistent Ransomware Attack

A set of backups may no longer be enough

Ransomware infecting backup tape

A journalist asked us if we felt that ransomware attackers had evolved. But the truth of the matter is, there’s no need for them to do so judging by the large number of publicised cases in which they are able to achieve success without being too creative.

Continue reading “Ransomware evolved – Persistent Ransomware Attack”
All posts

SE Labs has been hacked…

And we’re really quite proud about it!

SE Labs has been hacked

Our tests are so close to real-life hacking that sometimes there is no practical difference between the two. We don’t usually expect to interact directly with cyber criminals, but it sometimes happens. In this case, our attacker was rude enough to spoil our initial analysis and to leave a sexually aggressive message for our team, too. SE Labs has been hacked!


Continue reading “SE Labs has been hacked…”
All posts

Serial Hackers

How we run our Breach Response testing, and why

In this blog post our CTO Stefan Dumitrascu explains some of the challenges behind our newly launched Breach Response testing, why things are now different (better) and the background on how we came to make some of our decisions.

One of our most exciting projects this year has been the Breach Response testing programme. In this article we explain what has changed since last year, and why.

Continue reading “Serial Hackers”
All posts

Targeted attacks with public tools

We run attacks with public tools to keep our tests accurate and useful.

Over the last few years we have tested more than 50 different products using over 5,000 targeted attacks. And there’s news, both good and bad.

In this article we will look at the different tools available, how effective they are at helping attackers bypass anti-malware products and how security vendors have been handling this type of threat for over a year.

Continue reading “Targeted attacks with public tools”

Contact us

Give us a few details about yourself and describe your inquiry. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us