+44 (0)20 7877 0060 contact@2-sec.com
Select Page

Archive

You may have read reports online of two major flaws in a large number of microprocessors: Spectre and Meltdown. Spectre and Meltdown relate to an apparent vulnerability in chips which may allow the breaking of isolation between programs and operating systems. Whilst programs typically cannot read data from other programs, a malicious program may be […]

A day in the life of a 2-sec penetration tester

A day in the life of a 2-sec penetration tester

Alexander Drabek is part of our team of expert penetration testers; who “ethically hack” into client’s networks and find any potential weaknesses. We asked him exactly what it is he does, and how he does it. What skills do you need to become a penetration tester? Many...
Remember that $100 million whaling scam?

Remember that $100 million whaling scam?

Google users appear to have been the latest victims of the most recent phishing attack, this time through their file sharing Google Docs service. Victims were sent a sinister email disguised as a fraudulent invitation to edit a Google Doc that appears to come from one...
Incident Response

Incident Response

What is Incident Response? Any business needs to be well prepared for a cyber-attack and have the resources required to efficiently deal with a cyber incident. This is to not only to protect the company’s business objectives and reputation but also to restore its...