Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Why Does Continuous Penetration Testing Outperform Bug Bounties?
May 15, 2025 Sprocket Security

Ahead of the Breach - Why Does Continuous Penetration Testing Outperform Bug Bounties?

Casey addresses "Why does continuous penetration testing outperform bug bounties?"
How Prompt Injection Works & 8 Ways to Prevent Attacks
May 13, 2025 Sprocket Security

How Prompt Injection Works & 8 Ways to Prevent Attacks

Prompt injection is a type of attack used against AI models that process natural language inputs.
Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry
May 06, 2025 Sprocket Security

Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry

Cody explains why context is critical — a vulnerability on an isolated batch server requires different attention than one affecting your entire infrastructure.
How Spear Phishing Attacks Work and 8 Ways to Prevent Them
May 01, 2025 Sprocket Security

How Spear Phishing Attacks Work and 8 Ways to Prevent Them

Spear phishing is a targeted email attack that appears personalized and legitimate to an individual.
What It Really Means to Be a Hacker: Lessons from 10 Years in Offensive Security
Apr 29, 2025 Nate Fair

What It Really Means to Be a Hacker: Lessons from 10 Years in Offensive Security

What being a hacker really means—no title required. After a decade in offensive security, Nate Fair shares honest lessons on hacking.
A Love Letter to Nmap
Apr 24, 2025 Topher Lyons

A Love Letter to Nmap

A tool that can scan remote endpoints and provide details on if a host is live and what open ports and services exist on the host. In this blog, I’ll explore some unique and more advanced ways to use Nmap that will make you fall even more in love with the tool.
« 1 2 3 4 5 »