Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
How Can PCI DSS Compliance Prevent Data Breaches?
In this blog, we will take a look at how PCI DSS compliance standards actually stack up against threat actors general tactics, techniques, and procedures.
Practice Assembly With A Buffer Overflow Exercise
Use our free resource, Overflowme, to learn about programming in assembly and how the classic buffer overflow vulnerability can be exploited.
How To Identify URL Phishing Techniques
In this blog, we’ll break down some of the most common URL phishing tactics, identify detection and analysis methods, and discuss strategies to defend against them.
Docker for Web App Pentesters
Explore Docker’s potential for web app pentesters. From setting up vulnerable labs to ensuring a safe, isolated testing environment.
LLMNR Poisoning and How to Prevent It in Active Directory
0. OverviewActive Directory (AD) stands as a foundational piece for many organizational networks, streamlining administrative tasks and enhancing productivity. However, out of the box, AD comes bundled with various features and default settings that can be exploited...
SMB Relay Attacks and How to Prevent Them in Active Directory
0. OverviewMany organizational networks rely on Active Directory (AD) to streamline administrative tasks and enhance efficiency. However, some of its default configurations are vulnerable to attackers. The SMB (Server Message Block) protocols stand out as particularly...
Three Ways to Write More Secure Code
Three practices to bolster app security: treat every user as a threat, use static code analysis tools, and consider your tech stack.
Unearthing Secrets in Git Logs
Overview Version control systems, such as Git, are essential tools in software development, enabling seamless collaboration and change tracking. However, their widespread use can sometimes lead to unintended security oversights. While Git excels in managing code...
Cybersecurity Careers: Certifications vs. Learning Paths
Navigate your cybersecurity career: Dive into the merits of certifications vs. learning paths, and discover the most effective route to expertise.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








