Beyond the Annual Pen Test: The Case for Continuous Security Validation
September 8, 2025 Penetration testing, or pen testing, remains a cornerstone of modern cybersecurity.
September 8, 2025 Penetration testing, or pen testing, remains a cornerstone of modern cybersecurity.
A Deep Dive into Password Cracking Techniques When it comes to securing almost anything in this digital age, passwords are often the first, and sometimes only, line of defense.
August 27, 2025 A well-known red team tactic for blending Command-and-Control (C2) traffic in with legitimate network traffic involves utilizing Amazon Web Services (AWS) CloudFront redirectors to mas…
Traditional on-premises infrastructure has relatively clear security boundaries.
Missed Part one of this two-part blog series? Read it first to learn how Purple Teaming is elevating cybersecurity testing beyond a one-and-done checkbook exercises so that your pen test moves the nee…
Security testing is one of the best ways to ensure that your defenses can handle whatever is coming next.
December 19, 2024 As web, thick client, mobile, and IoT applications have become more robust, authentication and authorization has become an incredibly complex and sophisticated problem.
June 20, 2024 TL;DR: Compromise of an SCCM administrator account can easily lead to compromise of every machine managed by SCCM.
May 2, 2024 Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several attack primitives.
March 28, 2024 Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account and SCCM machine account.
August 1, 2023 Penetration testing, or pen testing, is a critical strategy for boosting an organization’s cybersecurity profile.
Published August 2023 Penetration testing is a crucial component of any organization’s cybersecurity strategy.