We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Weaponization of Token Theft – A Red Team Perspective
This blog is the start of several deep dives into the weaponization of token theft. The focus of this blog will be on conditional access around devices and…

Security Noise - Episode 6.15
OSINT: Digital Detective or Cyber Stalking?

MailItemsAccessed Woes: M365 Investigation Challenges
F5 Compliance add-on helps investigate email attacks, providing Mailbox Audit Logs (MALs) and insights into Create, Update, and other events for a more…

Advanced Cloud Pen Testing Scenarios
Explore advanced cloud pen testing scenarios with expert insights from Paul Burkeland and Security Consultants Edwin David and Patrick Mayo, elevating your…

Hardware Hacking: Plunder With a Bus Pirate
For this blog, I'm going to assume you have a Bus Pirate, you are able to access its terminal, and you are ready to use it—but what are you going to use it on?…

Ask Me Anything: Pen Testing from a Hacker's Perspective
Join seasoned experts Adam Compton, Lou Scicchitano, and Justin Elze for an interactive discussion on penetration testing, covering real-world insights, best…

Offensive Lab Environments (Without the Suck)
WhatHave you ever been in an engagement where you need to test an evasive payload or technique, but you lack the time or resources to spin up a replica lab…

Content Security Policy: Mitigating Web Vulnerabilities by Controlling the Rules of the Game
Defining a Content Security Policy (CSP) for your web application can significantly harden it against XSS attacks, packet sniffing, and clickjacking, while…

A Beginner’s Guide to Mobile Application Testing
As consumers become more dependent on mobile devices, the need for application security has become more of a priority. In this blog post, I will discuss my…

Security Noise - Episode 6.14
Extraordinary Incident Responders and Where to Find Them

The Rising Threat: A Surge in Zero-Day Exploits
IntroductionThe cat-and-mouse game between defenders and attackers continues to escalate in the ever-evolving cybersecurity landscape. Advanced Persistent…

Burrowing a Hollow in a DLL to Hide
1 Burrowing a Hollow in a DLL to Hide In this post about common malware techniques, we are still talking about hollowing—but this time, instead of hollowing…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
