Archive

Beyond the Annual Pen Test: The Case for Continuous Security Validation

September 8, 2025 Penetration testing, or pen testing, remains a cornerstone of modern cybersecurity.

Password Security, Part 1: The Dark Side of Passwords

A Deep Dive into Password Cracking Techniques When it comes to securing almost anything in this digital age, passwords are often the first, and sometimes only, line of defense.

Automating CloudFront C2 with AI – Reduce Errors & Save Time 

August 27, 2025 A well-known red team tactic for blending Command-and-Control (C2) traffic in with legitimate network traffic involves utilizing Amazon Web Services (AWS) CloudFront redirectors to mas…

Choosing the Right Cloud Security Assessment: A Decision Maker’s Guide

Traditional on-premises infrastructure has relatively clear security boundaries.

Purple Teaming Part 2: Inside the Lifecycle, from Preparation to Protection

Missed Part one of this two-part blog series? Read it first to learn how Purple Teaming is elevating cybersecurity testing beyond a one-and-done checkbook exercises so that your pen test moves the nee…

Purple Teaming Part 1: The Key to Better Cybersecurity Testing

Security testing is one of the best ways to ensure that your defenses can handle whatever is coming next.

The Critical Need for Multi-Role Testing in Application Security

December 19, 2024 As web, thick client, mobile, and IoT applications have become more robust, authentication and authorization has become an incredibly complex and sophisticated problem.

SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment

June 20, 2024 TL;DR: Compromise of an SCCM administrator account can easily lead to compromise of every machine managed by SCCM.

SCCM Exploitation: Compromising Network Access Accounts 

May 2, 2024 Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several attack primitives.

SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery 

March 28, 2024 Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account and SCCM machine account.

Pen Testing Should be Done More than Once a Year – Here’s Why:

August 1, 2023 Penetration testing, or pen testing, is a critical strategy for boosting an organization’s cybersecurity profile.

Go Beyond Conventional Penetration Testing with a Red Team Assessment

Published August 2023 Penetration testing is a crucial component of any organization’s cybersecurity strategy.