Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we’re able to overwrite it, and what kind of threat it exposes.Read more
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee’s profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.Read more
At CQURE we use our knowledge to make sure your company stays secure. That’s why we are pleased to inform that we’ve delivered yet another fantastic project to our esteemed Client, PKO Bank Polski.Read more
With sophisticated socially engineered phishing attacks on the rise, it’s hard to tell which messages in your inbox are safe. In this video demo, cybersecurity expert Paula Januszkiewicz determines whether a suspicious email she received is really an attempt to steal her credentials.Read more
Have you ever wondered what a possible future in the cybersecurity world would be like? When you think about what has happened recently, certain common conclusions can be reached.Read more