
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”






“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
Request a Call-back.
First we need a few details.
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
Request a Call
First we need a few details.
At Stripe OLT, our analysts face new challenges every day, and occasionally, we come across something noteworthy - recently at Stripe OLT, our team encountered a Gootkit malware exploit in one of our client's systems. Our SOC lead, Sam B, takes us through the encounter.
Many times, during software security testing (penetration tests), whitelisting and blacklisting are encountered, with testers trying to bypass the regex (regular expression). But, what is the actual process of identifying these characters that can bypass filters? How are new payloads formed? If you're looking for some technical, offensive security insights, you've come to the right place...
According to the World Economic Forum (WEF), cybercrime has emerged as the world's third-largest economy, trailing only the United States and China.
This isn’t supposed to be a sales pitch about Business Premium, but an insight to how the single pane of glass approach can both fortify your company’s security posture while also being a win for the financial chart enjoyers.
Taking an up to date approach, when it comes to password policies, doesn't have to be complex... Utilising Entra ID, our Microsoft expert Lewis, will take you through his latest recommendations.
Attackers are increasingly utilising QR codes in their phishing campaigns because they don’t just evade standard detection, they are incredibly difficult to detect without some significant effort.
A CVE (Common Vulnerabilities and Exposures) is a standardised identifier for a specific security vulnerability in a software application, hardware device, or system. Our pen tester Toby takes you through this latest discovery - CVE-2023-40017.
A CVE (Common Vulnerabilities and Exposures) is a standardised identifier for a specific security vulnerability in a software application, hardware device, or system. Our pen tester Toby takes you through this latest discovery - CVE-2023-40017.
According to the World Economic Forum (WEF), cybercrime has emerged as the world's third-largest economy, trailing only the United States and China.
Sign up for the latest news and Podcasts