Our nation is under attack and overwhelmed. Modern Security teams...
Read MoreTech Insight Articles
Cyber Threats increase during the Holidays! Preparation is key. Discover the latest cybersecurity technical articles designed to help your company reduce its risk against common vulnerabilities that we find daily.
Overcoming the Struggles of Cybersecurity Management
Our nation is under attack and overwhelmed. Modern Security teams...
Read MoreBeyond the Top 5: ICS/SCADA IT/OT Security
Is your security team sharing sensitive data unknowingly?
Read MoreNavigating Cybersecurity Threats with Monte Carlo Simulations and LLMs
Through repeated random sampling, allows us to simulate a wide...
Read MoreEvolving Your Cybersecurity: From Penetration Testing to Red Teaming
While penetration testing is valuable in identifying technical vulnerabilities, red...
Read MoreA Penetration Tester’s Perspective on OSINT
Malicious actors leveraging OSINT to uncover confidential and sensitive information...
Read MoreFrom an Attacker’s Perspective: Client-Side Desync
Client-side desyncs are a class of browser-powered HTTP smuggling attacks....
Read MoreNTLM relaying attack – Taking complete control
Active Directory Certificate Services (AD CS) presents various security risks...
Read MoreApplication Penetration Testing – Offensive Security
What is an API? APIs, including local and remote, come...
Read MoreExamining the Modbus Protocol from an Offensive Security Perspective
While plenty of articles cover the Modbus protocol with varying...
Read MoreThe Impact of Recent Cybersecurity Layoffs: Evaluating the Risk of a Serious Cyber Attack
Recent reports of significant cybersecurity layoffs in the United States...
Read MoreMachine Learning & Artificial Intelligence
Machine Learning (ML) is a subset of AI, and, more...
Read MoreICS/SCADA Penetration Testing: Where to Start
Becoming proficient in Operational Technology (OT), Industrial Control Systems (ICS),...
Read MoreAS-REP Roasting
Kerberos Authentication Service Response (AS-REP) Roasting, a technique similar to...
Read MorePHP Insecure Deserialization
Attackers can manipulate the serialized data to execute malicious code,...
Read MoreMass Assignment Vulnerabilities
Mass Assignment Vulnerability occurs when a web application allows users...
Read MoreInsecure Direct Object Reference (IDOR)
Insecure Direct Object Reference (IDOR) vulnerabilities pose a significant risk...
Read MoreAndroid Malware
The likelihood of a cyber attack on a mobile platform...
Read MoreSecurity Incidents Involving Family Members
Should an Employee Report Security Incidents Involving Family Members? Is...
Read MoreAttack Surface Management (ASM)
Today, cybercriminals have plenty of entry points to exploit. Therefore,...
Read MoreWireless Penetration Testing Services
The following article is a discussion that explores Wave Behaviors...
Read MoreApplication Security – JavaScript Web Tokens
The following article is a discussion that explores JavaScript Web...
Read MoreFrom Military Cyberwarfare to Commercial Pen Testing
The following article is a discussion about helping you to...
Read MoreMicrosoft Windows Laptop Security
Malicious actors prey on weak configurations like locusts. Microsoft, despite...
Read More
Redbot Social