• Our Services
  • Knowledge Centre
  • About
  • Contact
  • Our Services
    • Adversary Simulation
    • Application Security
    • Penetration Testing
    • Response
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Contact
  • Adversary

    Adversary Simulation

    Our best in class red team can deliver a holistic cyber attack simulation to provide a true evaluation of your organisation’s cyber resilience.

  • Application Security

    Application
    Security

    Leverage the team behind the industry-leading Web Application and Mobile Hacker’s Handbook series.

  • Penetration Testing

    Penetration
    Testing

    MDSec’s penetration testing team is trusted by companies from the world’s leading technology firms to global financial institutions.

  • Response

    Response

    Our certified team work with customers at all stages of the Incident Response lifecycle through our range of proactive and reactive services.

  • Research

    MDSec’s dedicated research team periodically releases white papers, blog posts, and tooling.

  • Training

    MDSec’s training courses are informed by our security consultancy and research functions, ensuring you benefit from the latest and most applicable trends in the field.

  • Insights

    View insights from MDSec’s consultancy and research teams.

  • Disabling Security Features in a Locked BIOS

    Mar 26th, 2026

    Written by: Admin

    Exploitation

    Overview This post explores how modifying a Dell UEFI firmware image at the flash level can fundamentally undermine platform security without leaving visible traces in the firmware interface. By directly…

  • RIP RegPwn

    Mar 13th, 2026

    Written by: Admin

    ActiveBreach

    13th March 2026 As part of MDSec’s R&D work, we often discover vulnerabilities and develop exploits to support our red team engagements. When researching widely used software, it is often…

  • Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM

    Feb 27th, 2026

    Written by: Admin

    Adversary Simulation

    27th February 2026 The MDSec red team are regularly performing research to identify privilege escalation vectors in Windows and macOS for use during red team engagements. Where the indicators in…

  • Function Peekaboo: Crafting self masking functions using LLVM

    Oct 27th, 2025

    Written by: Admin

    ActiveBreach

    Introduction LLVM compiler infrastructure is powerful because of its modular design, flexibility, and rich intermediate representation (IR) that enables deep analysis and transformation of code. Unlike traditional compilers, LLVM separates…

  • How Scattered Spider Exploited Weak Links in UK Retail Security

    Oct 1st, 2025

    Written by: Admin

    All

    In recent months, a series of high-profile cyber attacks have hit the UK’s retail and automotive industries, targeting major companies like M&S, the Co-op, Harrods, and Jaguar Land Rover (JLR)….

  • Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris)

    Dec 3rd, 2024

    Written by: Admin

    ActiveBreach

    Introduction On a recent Red Team for a particularly hardened client, we were looking to escalate our privileges in order to move off the endpoint and pivot into the server…

  • Nighthawk 0.3.3 – Evanesco

    Nov 29th, 2024

    Written by: Admin

    ActiveBreach

    Introduction Nov 29, 2024 Nighthawk C2 – This post is cross posted to the Nighthawk blog. Nighthawk 0.3.3; Evanesco, unveils our latest research. “Evanesco” is a Latin term that means “I…

  • From Panic to Prepared: How To Become DORA Compliant

    Oct 29th, 2024

    Written by: Admin

    All

    Following on from our blog post in September, Finding Dora. DORA sets a new standard for how financial institutions and service providers within the EU should handle their digital operations….

  • When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls

    Oct 28th, 2024

    Written by: Admin

    All

    Web Application Firewalls (WAFs) help to protect web applications by monitoring, filtering, and blocking HTTP traffic to and from a web service. However, WAFs are too often relied upon as…

  • Finding DORA

    Sep 13th, 2024

    Written by: Admin

    ActiveBreach

    The Digital Operational Resilience Act (DORA) is a landmark European Union (EU) regulatory framework that requires mandatory compliance from January 2025. DORA emphasises the importance of resilience for digital assets…

Page 1 of 141 2»Last

Recent Posts:

  • Disabling Security Features in a Locked BIOS
  • RIP RegPwn
  • Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM
  • Function Peekaboo: Crafting self masking functions using LLVM
  • How Scattered Spider Exploited Weak Links in UK Retail Security

Archive:

  • March 2026
  • February 2026
  • October 2025
  • March 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • June 2024
  • April 2024

Page Links:

  • Responsible Disclosure Policy
  • Nighthawk
  • Privacy Policy
  • MUTUAL NON-DISCLOSURE AGREEMENT
  • Home
  • Our Services
    • Adversary Simulation
      • Red Team Operations
      • Purple Teaming
    • Application Security
      • Application Security
      • Large Language Models
      • Mobile Security
    • Penetration Testing
      • Infrastructure Security
      • Product Assessment
      • Cloud Security Assessment
    • Response
      • Retained Response
      • Emergency Response
      • Cyber Readiness
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Careers
  • News
  • Contact
MDsec

Services

  • Adversary Simulation
  • Application Security
  • Penetration Testing
  • Response

Resource Centre

  • Research
  • Training
  • Insights

Company

  • About
  • Contact
  • Careers
  • Privacy

t: +44 (0) 1625 263 503
e: contact@mdsec.co.uk

32A Park Green
Macclesfield
Cheshire
SK11 7NA

Accreditations

Best
IT Health Check Service
Crest Star
Crest
Cyber Essentials
British Assessment Bureau
Copyright 2026 MDSec