Get an overarching assessment of your behaviors and technology and defend against current and future threats by ensuring best security practices.
We specialise in security design & reviews, code audits, and blackbox security testing.
Test your team's incident response readiness and the effectiveness of your security tools before a real attack ever happens with a realistic attack simulation.
We offer Secure Development courses, Offensive Security training, Incident Response Readiness teaching, and more.
Want to run a hacking competition? We can build and host it with uniquely crafted challenges tailored to your niche and your players.
Whether you're building cutting edge security technology or looking for advanced reverse engineering skills, we're ready to hear more about your tough engineering challenges.
Dan previously worked as a security consultant for Bitsec AB. He specialises in vulnerability research, binary reverse engineering, and exploit development.
Update: We're happy to announce that our session has been accepted at BlackHat USA 2017. Hope to see you there! We will speak in detail about the inner workings of iCloud keychain and the OTR vulnerability.
About two years ago, Eduardo Vela pointed out that the Navigator Beacon API can be used to exploit "accidentally-CSRF safe" websites. Philip Olausson and I recently noticed Chrome 59, which just shipped, addressed this behavior and we investigated a Flash bypass.
At Longterm Security, we provide training for organizations looking to build up or improve their in-house Security Operations capabilities. Our other trainings include offensive security training which focuses on reverse engineering, vulnerability discovery, and bypassing exploit mitigations.We also have defensive security training for security design reviews, secure coding and testing methodology.
Over the years there have been numerous high-profile attacks that have compromised accounts hosted on Google Mail or the G Suite. There are some highly effective measures that can be taken to help prevent these scenarios. And the most important tip is probably…