We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Perspectives on AI in the Cybersecurity Industry in 2026
Join us for this exclusive webinar where our experts will decode the complex relationship between artificial intelligence and cybersecurity in 2026. What will…

Securing Entra ID Administration: Tier 0
Entra ID (formerly Azure AD) is the core service upon which Microsoft 365 applications rely for directory and authentication services. This makes Entra ID…

Security Noise - LLM = Love Language Model?!
In this episode of Security Noise podcast, we are discussing the crossover of AI into our romantic lives. How are LLMs used to social engineer or catfish…

Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive
The Cheat Sheet section is for quick reference.The Learn section is for those who have never touched the topic before.The Implement section is for more…

MCP in Burp Suite: From Enumeration to Targeted Exploitation
MCP-ASD Burp extension has been submitted to the BApp Store and is awaiting approval.MCP OVERVIEWMCP (Model Context Protocol) servers are becoming more common…

LDAP Channel Binding and LDAP Signing
With Microsoft “enforcing” Lightweight Directory Access Protocol (LDAP) Signing by default in Server 2025, it once again seems like a good time to revisit our…

Security Noise - Navigating Authorization with a Copilot
What are the data security risks associated with using Microsoft Copilot? Listen to this episode to explore the importance of data classification policies and…

Adventures in Primary Group Behavior, Reporting, and Exploitation
If you’ve administered Active Directory (AD) for any significant time, chances are you’ve come across the primaryGroupID attribute. Originally developed as a…

Colonel Clustered: Finding Outliers in Burp Intruder
TL;DR, gimme the goods: https://github.com/hoodoer/ColonelClusteredExtension has been submitted to the Bapp store, awaiting approval.This is a Burp Suite…

CMMC Scope – Understanding the Sprawl
The CMMC program contains complex, and potentially confusing, scope requirements. Contractors that are preparing for a CMMC assessment will need to pay close…

Tips for Incident Response Planning: Prepare Before Crisis Strikes
During our next webinar, our Incident Response experts will cover what organizations should do to prepare so they can respond quickly and be on the way to…

Updating the Sysmon Community Guide: Lessons Learned from the Front Lines
Over the past few weeks I’ve been spending a significant amount of time updating the Sysmon Community Guide. This wasn’t driven by theory, trends, or what…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
