Case Studies & Expert Insights
Explore expert insights and case studies from Liverton Security.

Complexity of Security (Part 1)
All Case Studies & Expert Insights
Deep dive into solutions and cybersecurity topics with our experts

A Pentest Adventure: From Shells to Access Cards
During a network penetration test for an international client, initial access was gained by exploiting a vulnerability in a publicly exposed application. This led to command execution, a reverse shell, and ultimately full Remote Desktop Protocol (RDP) access to the system. What appeared to be a single compromised machine marked only the beginning of a much broader security story.

Did you forget your Cat? Tom?
A penetration test uncovered an exposed Apache Tomcat server running default credentials, leading to remote command execution. Learn why forgotten systems remain a critical security risk.

Did They Lose Their Keys? A Black Box Pentest Adventure
Old code and forgotten API keys can create serious security risks. In this black box penetration test, a valid key was discovered in an abandoned repository—proving that attackers don’t always need malware or zero-days to gain access. Learn how simple oversights can open the door to sensitive data.

A Tale of Burgers and Broken Security
What began as a simple burger order through a food delivery app quickly exposed a serious security flaw. While checking the order history, the presence of a visible Order ID sparked curiosity. By changing this number slightly, it was possible to view another customer’s order, including their delivery address, and even reorder their meal. The incident highlights a basic but critical security failure: inadequate access controls that allowed unauthorised access to other users’ data through predictable identifiers.

The Problem with One-Size-Fits-All Cybersecurity (Podcast)
Richard Bourne, Chief Executive of Liverton Security, joins the Hipther Podcast to discuss a critical topic in today’s cybersecurity landscape—Why One-Size Cybersecurity Doesn’t Work. Richard shares insights on the evolving nature of cyber threats, the importance of tailored security solutions, and how organisations can better protect themselves from emerging risks.