by Josh Daniels | Oct 29, 2025 | Penetration Testing
If you’re just starting out in cybersecurity, you’ve probably heard both terms, vulnerability scanning and penetration testing, used almost interchangeably. They sound similar, and both aim to uncover weaknesses in systems, but they play very different roles in a...
by Josh Daniels | Oct 15, 2025 | Artificial Intelligence, Penetration Testing
Credential stuffing remains one of the most efficient paths to account takeover, and AI assistance is changing the economics and effectiveness of those attacks. Below is a practitioner-focused examination of how the classic stuffing workflow works, how AI augments it,...
by Josh Daniels | Oct 8, 2025 | Security
As our personal lives, businesses, entertainment, and communities move deeper into digital spaces, various levels of Open Source Intelligence (OSINT) have become commonplace. From verifying a suspicious social media account to conducting a highly targeted phishing...
by Josh Daniels | Oct 1, 2025 | Learning, Penetration Testing
Networking is the foundation of IT. IT is the foundation of Pentesting. If you’re just starting out from a background that didn’t include the fundamentals of networking, you might feel lost and behind when the subject comes up. If offensive cyber security...
by Josh Daniels | Sep 24, 2025 | Career Advice, SOC
On paper, or YouTube feeds, the cyber security job market looks like there’s endless demand for talent. In reality, the “entry-level” postings for SOC (Security Operations Center) analyst roles often expect experience that looks more like mid-level. The result:...