Hero

Security Partner of top Image technology companies

We are a top-tier security testing team, specialising in advanced security assessments and penetration testing on widely used and high profile technologies.

Security Testing Services

We endeavour to understand your needs and support you in realising your goals through meticulous analysis and testing.

Globe
Icon

IconSecurity Testing

Security testing of software, hardware, and infrastructure through comprehensive review and assessment.

Icon

IconAdversary Simulation

A scenario driven testing approach where we collaborate to customise a tailored red or purple team exercise.

Icon

IconApplied Research

A research-driven service providing technical expertise to understand and respond to niche security challenges.

Trusted By

Meet some of our clients

Home

Talkback: A Real-time Cyber Security Resource Library

At elttam, we actively stay ahead of bleeding edge technology and security vulnerabilities and exploits. We have developed Talkback, a library of cyber security publications, news, and reports, to help our team and the wider community be more efficient and effective at keeping up with content.

Talkback brings together news and publications from all corners of the internet which is then hydrated by integrations then AI/ML to classify, summarise and organise all content. The Talkback dataset is available via the UI and also an API.

Go to Talkback
in the media

What all the fuss is about

Latest from Our Blog

view all articles
Blog DUCTF 2024 ESPecially Secure Boot Writeup

By daniel August 02, 2024

This blog post covers a DUCTF 2024 pwn challenge called "ESPecially Secure Boot", which required writing an exploit for CVE-2018-18558.

Blog plORMbing your Prisma ORM with Time-based Attacks

By Alex Brown July 09, 2024

Part two of our ORM Leak series about attacking the Prisma ORM and leaking sensitive data in a time-based attack.

Blog plORMbing your Django ORM

By Alex Brown June 24, 2024

This blog article explains what are ORM Leak vulnerabilities, how they could be exploited to access sensitive information with the Django ORM.