Vulnerability Management and Assessment

December 10, 2020
HPE 3PAR Authentication Bypass Vulnerability

Critical HPE 3PAR Authentication Bypass Vulnerability Discovery Details  This blog covers a recent security vulnerability found by a team of...

Read More
July 13, 2020
WebTA SQLi Vulnerability

Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
February 5, 2020
3 Vulnerabilities to be on the Lookout for in 2020

Watch Out for these Vulnerabilities in 2020 1. Security Misconfigurations What is a security misconfiguration? A security misconfiguration occurs when...

Read More
November 18, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing

Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we...

Read More
November 14, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration

Pen Testing REST API with Burp Suite Introduction: Hello and welcome to our 3-part blog series where we will take...

Read More
July 18, 2018
A Tale Of Two Tools: When Splunk met SecurityCenter

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...

Read More
June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

  Importance of Third-Party Risk Tiering It can be a challenging and overwhelming task to adequately manage the risk associated...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud

Read More
August 5, 2016
Hacking Hillary: Recent Breaches against Democratic Political Groups

A recent leak of thousands of Democratic National Committee emails cast a long shadow over the Democratic Convention in Philadelphia...

Read More
March 14, 2016
Electronic Voting for the 21st Century

With the election year ahead it behooves us to take a look at the security of our voting systems and...

Read More
October 15, 2015
Privilege Escalation via Group Policy Preferences (GPP)

While Privilege Escalation via Group Policy Preferences (GPP) is not a new topic in the penetration testing world by any...

Read More
12