Technical Blogs

The Good, the bad, and the ugly of Microsoft Edge’s autofill databases

Introduction A recent investigation by our DFIR team into unauthorised data exposure brought to light…

Read more
Reliance-Cyber-RealVNC-Case-Study-Carousel Background
Three-dimensional lock icon isolated on abstract blue background. 3D illustration.

When vendors let us down

Over two decades in cybersecurity, I’ve seen countless trends, threats and hype curves come and go. But one constant remains: We rely so much on our vendors — and it’s profoundly damaging when they introduce the very weaknesses that they’re supposed to protect us from.

Read more
Reliance-Cyber-RealVNC-Case-Study-Carousel Background

The Good, the bad, and the ugly of Microsoft Edge’s autofill databases

Introduction A recent investigation by our DFIR team into unauthorised data exposure brought to light…

Read more
Reliance Cyber Security Ticketing Loop

A New Weak Spot in Business Email Security: Inside the TICKETING LOOP

Introduction At Reliance Cyber, our Incident Response and Extended Detection and Response (XDR) teams recently…

Read more
A person intently typing on a laptop, fully engrossed in their work.

How to use your own certificates to secure your Velociraptor deployment

Using DigiCert as the certificate Authority Introduction Velociraptor is a robust open-source tool designed for…

Read more

Book your free 30-minute cyber security consultation