skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

The Trouble with Traditional Penetration Testing

When it comes to pen testing, organizations require access to the skills they need when they need them. Large consultancy groups often leverage a “one-size-fits-all” approach to pen testing. Although the resumes these groups highlight may seem impressive, it’s rare…

Read More

PrintNightmare: What You Need to Know

PrintNightmare or PrinterNightmare is an interesting vulnerability currently impacting Microsoft systems. This vulnerability can be executed on remotely accessible systems and has a lot of potential for abuse by ransomware operators.  Here are the basics: PrinterNightmare - CVE-2021-34527 CVE ID:…

Read More

The Kaseya/REvil Attack Explained

Why it Matters and How to Protect Yourself What Happened? At around 1400 EDT on July 2, attackers appear to have used a 0-day authentication bypass vulnerability in Internet-exposed instances of the Kaseya Virtual System Administrator (VSA) server software, a…

Read More

The Problem with Limited Scope

Attack surface has grown exponentially for many organizations, and with it, their susceptibility to weaknesses. To combat this reality, security teams utilizing crowdsourced security solutions have expanded their program scopes to include more and more of their ever-evolving assets. Notable…

Read More
Back To Top