Skip to content
Logically Secure Ltd
Menu
  • Testing Services
  • Incident Response
  • Consulting
  • Blog
  • About Us
    • Careers
    • Contact Us
    • Data Handling

Category: News

Article / CVE / Front Page / News / Security / Software Security / Testing

3CX Phone System Web console affected by XXE

XXE vulnerability in 3CX Phone System Another vulnerability discovered by Logically Secure. This time it is XXE (XML External Entity Injection) and SSRF (Server-Side Request Forgery) in 3CX Phone System …

Article / Front Page / News

We’re at InfoSecurity 2019

Come see us at InfoSecurity 2019!

504-wiki / Front Page / News

SANS@Night London April 2019 Talk by Steve Armstrong

Thanks for coming to the evening presentation at the SANS London April 2019 event.

504-wiki / News

Protected: SANS Secure India 2019 Links

There is no excerpt because this is a protected post.

CVE / Front Page / News / press / Security / Software Security / Testing

LS Team discovers XSS in WordPress Plugin

Often during the penetration testing activities our team comes across potentially unsafe behaviours, coding errors and unspecified misconfiguration errors. This time we had a full access to the WordPress instance, …

504-wiki / Front Page / News

Protected: SANS Threat Hunting 2019 links

There is no excerpt because this is a protected post.

504-wiki / Front Page / News

Protected: SANS London September Links

There is no excerpt because this is a protected post.

504-wiki / Front Page / News

Protected: SANS Copenhagen Links

There is no excerpt because this is a protected post.

Article / Front Page / News

SANS@Night Berlin Talk

Here are my slides from the SANS@Night talk in Berlin on 24th July.

504-wiki / Front Page / News

Protected: SANS Berlin (July) Links

There is no excerpt because this is a protected post.

Posts navigation

Older posts
Newer posts

Recent Posts

  • 9 Basic Steps to help check an email isn’t Phishing
  • 5 key security factors to working from home more safely
  • 11 Common Cyber-attack Methods
  • 10 fundamental steps of cyber security
  • The Importance of Two-Factor Authentication (2FA)
Copyright © 2023 Logically Secure Ltd