Select Page

Death by keystrokes

As part of our Red Team operations, at SECFORCE we research about effective and stealthy ways of delivering and executing arbitrary code on victim workstations. One of the key areas of research is around identification of AV limitations in Macro-enabled Office...

Your Voice Is My Password

Introduction There is a lot of hype around A.I. as it’s being presented as the next candidate for a ground-breaking technological disruption. While this is certainly happening for some specific areas such as the smart-home devices ecosystem, others like...

BSides Belfast

I have never been to any of the larger Cons like Blackhat or Defcon. Sure the parties seem great and it would be awesome hanging out with so many hackers plus there are some excellent talks but given the time and cost of getting there it can be hard to justify. Over...

Meet us in Brussels!

We are liaising with UK Trade & Investment and the British Embassy in Brussels to deliver a seminar about “How Exposed are we to the Cyber Threat?” on Thursday 24 April We will be talking about penetration testing and delivering a demo about the...