The Mass Exploitation Playbook
Learn how hackers exploit vulnerabilities at scale, what businesses can do to protect themselves, and why penetration testing is essential for robust cybersecurity
Learn how hackers exploit vulnerabilities at scale, what businesses can do to protect themselves, and why penetration testing is essential for robust cybersecurity
SMB Relay attacks are like a game of telephone where everyone loses.
ADCS attacks can make any pentester (or attacker) salivate. Lets talk about how to find and fix them.
As I was doing chores around the place today (thatching the lawn.. ugh). I saw a post about a new CVE in WordPress. It’s an SQLi… As a former dev, let me say this: THERE IS NO EXCUSE FOR SQLi. NONE. ZERO. NADA.
The urgency to “do something” to increase defenses against ransomware has never felt more critical. However, it can be difficult to know where to focus. It doesn’t help that every security vendor on the planet sells you their security software as the golden ticket, only to find out later that it fools gold.
Tired of Pen Test Fallout? Get Focused Remediation with Virtual Red Teamer