Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft
Jan 14, 2025 Sprocket Security

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft

Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
Penetration Testing as a Service: Pros/Cons and Choosing a Provider
Jan 10, 2025 Sprocket Security

Penetration Testing as a Service: Pros/Cons and Choosing a Provider

PTaaS offers continuous, cloud-based security through simulated cyberattacks, helping organizations identify vulnerabilities in real-time.
6 Stages of the Vulnerability Management Lifecycle
Jan 08, 2025 Sprocket Security

6 Stages of the Vulnerability Management Lifecycle

The vulnerability management lifecycle is a structured approach to managing potential security weaknesses in information systems.
Ahead of the Breach - Kieran Smith, Lead Pentest Engineer, N-able
Jan 07, 2025 Sprocket Security

Ahead of the Breach - Kieran Smith, Lead Pentest Engineer, N-able

Join Keiran Smith, Lead Pentest Engineer at N-able, as he shares his journey from teenage hacker to security leader, discussing the intersection of development and security testing, and providing insights for aspiring pentesters.
5 Penetration Testing Standards to Know in 2025
Jan 02, 2025 Sprocket Security

5 Penetration Testing Standards to Know in 2025

Penetration testing standards are structured guidelines that define best practices, methodologies, and procedures for executing security assessments.
Vulnerability Testing: Process, Methods & Best Practices
Dec 27, 2024 Sprocket Security

Vulnerability Testing: Process, Methods & Best Practices

Vulnerability testing is the process of identifying, assessing, and addressing security weaknesses in systems, networks, or applications
« 5 6 7 8 9 »