HPE 3PAR Authentication Bypass Vulnerability
Critical HPE 3PAR Authentication Bypass Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of...
Read MoreWebTA SQLi Vulnerability
Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...
Read More3 Vulnerabilities to be on the Lookout for in 2020
3 Vulnerabilities to be on the Lookout for in 2020 1.Security Misconfigurations What is a security misconfiguration? A security misconfiguration...
Read MoreREST Assured: Penetration Testing REST APIs Using Burp Suite: Part 3 – Reporting
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing
Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we...
Read MoreREST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration
Pen Testing REST API with Burp Suite Introduction: Hello and welcome to our 3-part blog series where we will take...
Read MoreA Tale Of Two Tools: When Splunk met SecurityCenter
Co-Authors: Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...
Read MoreHardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization
Inherent Risk Tiering for Third-Party Vendor Assessments
Importance of Third-Party Risk Tiering It can be a challenging and overwhelming task to adequately manage the risk associated...
Read MoreStop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts
Read MoreStop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud
Read MoreWhen Perception is Not Reality: Perspectives on State-Sponsored Hacking and Retaliation
Hacking Hillary: Recent Breaches against Democratic Political Groups
A recent leak of thousands of Democratic National Committee emails cast a long shadow over the Democratic Convention in Philadelphia...
Read MoreElectronic Voting for the 21st Century
With the election year ahead it behooves us to take a look at the security of our voting systems and...
Read MorePrivilege Escalation via Group Policy Preferences (GPP)
While Privilege Escalation via Group Policy Preferences (GPP) is not a new topic in the penetration testing world by any...
Read More