Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
How AI Threatens Security Operations
The development of AI has produced benefits for security operations, but also accelerated the capabilities and scale of threat actors.
Differences Between a Vulnerability Scan and a Penetration Test
Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take a look at the key differences between the two options and paint a clearer picture on what option you should choose for your company.
Social Engineering And External Pentests
In this article, we will explore the benefits and drawbacks of social engineering and how to best include this tactic when defining the scope of an external pentest.
What is CORS (Cross-Origin Resource Sharing) and Why You Should Care About It
CORS is a security feature that prevents unauthorized access to web resources. This article looks at CORS and then how CORS attacks work.
Penetration Testing – From Adversary to Partner
While penetration testing can be considered “adversarial” testing, it should be anything but that. Your penetration test, no matter who you do it with, should be a partnership. In every partnership, communication is key. Settling for a pentest company that merely...
The Science of Learning for Hackers
The science behind learning is a fascinating field that’s constantly evolving. There is no single, definitive answer to what the most effective learning technique is, and if there was, it would likely vary from person to person. However, there are a number of...
Getting Started with Offensive JavaScript
JavaScript is a bit like Marmite, you either love it or hate it. Regardless of how it makes us feel, it is a powerful tool for attacking users and exploitation. Often, popping alert(1) is proof enough to get a fix but doesn’t demonstrate the full impact an attacker...
The Fundamentals of HTTP for Hackers
Hypertext Transfer Protocol (HTTP) is an application layer protocol. On the surface, HTTP can appear quite simple, but there are a lot of quirks considering its use across inconsistent browsers and servers. Check out a video version of this article:Breaking Down An...
Security Testing Requirements for PCI-DSS
Companies handling credit card data must adhere to the Payment Card Industry Data Security Standard. Learn which PCI-DSS requirements require security testing.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








