by Josh Daniels | Nov 12, 2025 | Career Advice, SOC
Introduction As our daily lives become increasingly connected to the digital world, ensuring its security has never been more important. There are threat actors ranging from kids looking to cause mischief to nation states bent on creating chaos for their adversaries,...
by Josh Daniels | Nov 5, 2025 | Penetration Testing
What is the Difference Between Network and Cloud Pentesting? The short version is: They’re very similar, drawing from the same methodology and some similar attack methods. Cloud penetration testing is an offensive security mindset shift toward identities,...
by Josh Daniels | Oct 29, 2025 | Penetration Testing
If you’re just starting out in cybersecurity, you’ve probably heard both terms, vulnerability scanning and penetration testing, used almost interchangeably. They sound similar, and both aim to uncover weaknesses in systems, but they play very different roles in a...
by Josh Daniels | Oct 15, 2025 | Artificial Intelligence, Penetration Testing
Credential stuffing remains one of the most efficient paths to account takeover, and AI assistance is changing the economics and effectiveness of those attacks. Below is a practitioner-focused examination of how the classic stuffing workflow works, how AI augments it,...
by Josh Daniels | Oct 8, 2025 | Security
As our personal lives, businesses, entertainment, and communities move deeper into digital spaces, various levels of Open Source Intelligence (OSINT) have become commonplace. From verifying a suspicious social media account to conducting a highly targeted phishing...