Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2022

The Kill Switch - A Look into a Hackers Methodology

We’re kicking off a new series of blogs featuring some of the best live and recorded content from our consultants with Alex’s ‘The Kill Switch’ talk as seen at the Future of Cybersecurity Event. Alex talks us through a hackers methodology. Focusing on threat sources, threat actors and how to analyse said threats. He then walks through the methodology known as ‘The Kill Chain’.

Sponsored Post

Under the Sheets, Practical Android Static Analysis

First off, before we get into the technical details of attacking applications, a few housekeeping bits must be understood. This blog is aimed at technical individuals that already understand at a basic level Android development and architecture, aiming to give security testers and application developers an insight into the ways an attacker may interrogate code to achieve some form of compromise.