Blog: Technical

  • News
The Rise of Infostealers: How Digital Identity Theft Fuels the Cybercrime Economy
Posted by: Justin Timothy
Read More 8 min read
  • News
GRITREP: Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Posted by: Jason Baker
Read More 3 min read
  • Application Security
The Secret Life of APIs: Uncovering Hidden Endpoints and More
Posted by: Navin Dhas
Read More 7 min read
  • Threat & Attack Simulation
The Birth and Death of “LoopyTicket” – Our Story on CVE-2025-33073
Posted by: Cameron Stish
Read More 8 min read
  • Threat & Attack Simulation
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
Posted by: Andre Rosario
Read More 10 min read
  • News
RansomHub Affiliate leverages Python-based backdoor
Posted by: Andrew Nelson
Read More 5 min read
  • Application Security
RACE Conditions in Modern Web Applications
Posted by: Austin Turecek
Read More 8 min read
  • Technical
Developing and Implementing a Privacy Program
Posted by: Moji Sowemimo
Read More 5 min read
  • OT Security Services
Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)
Posted by: GuidePoint Security
Read More 4 min read
  • Blog
How Hackers Steal Your RFID Cards
Posted by: Nick Fryer
Read More 13 min read
  • Blog
How to Make Adversaries Cry: Part 1
Posted by: Joaquim Nogueira
Read More 9 min read
  • GRIT® Blog
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider
Posted by: Jason Baker
Read More 11 min read