Category Archives: hacking

Interview tips from a Senior Security Leader

First off I would like to thank Anshu Gupta for allowing us to republish his article. Anshu has experience working at some of the biggest names in tech here in the USA and has sat on both sides of the table so his insight is invaluable. When I read it I thought it had some great advice…

Speaking at IANS CISO Roundtable

We are excited to announce that one of our Co-Founders Kris Rides will be speaking at the IANS CISO Round-table event in Downtown Los Angeles on Tuesday 15th May. Kris will be discussing “Overcoming Challenges to Build a High Performing Team” with a select group of CISOs. During this 1:1 interview, IANS CEO Phil Gardner will…

SXSW 2018 – Speaking on IoT Security

Tiro Security Co-Founder and Head of Penetration Testing, Rob Pope will be speaking at the world renowned SXSW Conference in Austin, TX on the 14th March 2018. Rob will be infusing some of his British humor into the talk entitled Internet of Scary Things: Botnet in a Box.  For more information please click here. We have posted these before but here…

Speaking at OWASP LA – February Meeting

We are excited to announce that Justin Regele one of our amazing Penetration Testers will be speaking at the OWASP Los Angeles meeting on Wednesday 28th February. Justin’s talk is titled: Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler Grawler is a command line utility written in Bash and Python that crawls the…

Speaking at SchmooCon

We are excited to announce that Justin Regele one of our amazing Penetration Testers will be speaking at ScmooCon on Saturday 20th  January. Justin’s talk is titled: Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler Grawler is a command line utility written in Bash and Python that crawls the object trees of a…

Zero-Day alert: Spectre and Meltdown Widespread Hardware Vulnerability

Your computer, your phone, your tablet, your TV server: if it has a computer chip and can be accessed, it is vulnerable to Spectre and Meltdown. These are the names of data security vulnerabilities found in the physical hardware that is used in nearly all computers and handheld devices dating back over 20 years. Companies…

Speaking today on IoT Security

With the recent launch of Amazon Key the visibility around Smart Homes and IoT Security is an even hotter topic.  Insecure IoT devices are helping to create some of the largest botnet networks we have ever seen.  These networks are being used to spread malware and create a huge platform for distributed denial-of-service (DDoS) attacks which take down…

DEF CON: a Glimpse into the Largest IT Security Convention!

The largest, oldest, and most well-known convention for all things IT Security is DEF CON, which is currently being held in Las Vegas, Nevada! DEF CON began in 1993 as the first hacking convention. It was originally brainstormed as a going-away party for Platinum Net, which was an old hacking network once based in Canada….

Security for the SMB: Preventing a Business Nightmare

T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…

Wanna Cry? Updating your systems is crucial!

When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…