Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Sprocket Security

Blogs by Sprocket Security
Ahead of the Breach - Microsoft’s Tori Westerhoff on Offensive Security in the Age of AI
Dec 23, 2025

Ahead of the Breach - Microsoft’s Tori Westerhoff on Offensive Security in the Age of AI

What it takes to break AI systems before attackers do
Ahead of the Breach - Former Nevada Air National Guards's Nikita Belikov on Real-World Cyber Defense at Scale
Dec 16, 2025

Ahead of the Breach - Former Nevada Air National Guards's Nikita Belikov on Real-World Cyber Defense at Scale

Mission Readiness, Resilience, and Cyber Defense in High-Stakes Environments
Ahead of the Breach - MacArthur Foundation's Seth Arnoff on Top AI and Quantum Threats
Dec 12, 2025

Ahead of the Breach - MacArthur Foundation's Seth Arnoff on Top AI and Quantum Threats

What does modern cybersecurity actually look like inside a mission-driven organization with a lean team, high expectations, and zero tolerance for unnecessary friction?
Emerging React & Next.js Vulnerabilities: What We Know About CVE-2025-55182 and CVE-2025-66478
Dec 05, 2025

Emerging React & Next.js Vulnerabilities: What We Know About CVE-2025-55182 and CVE-2025-66478

Emerging React and Next.js vulnerabilities (CVE-2025-55182, CVE-2025-66478): what Sprocket Security is seeing, current detection coverage, and guidance for teams.
Ahead of the Breach - F-Secure Corporation's Megan Squire on Infostealers
Dec 02, 2025

Ahead of the Breach - F-Secure Corporation's Megan Squire on Infostealers

Infostealers aren't new, but their impact has fundamentally changed. Megan Squire breaks down how infostealer malware has quietly become one of the most prolific engines behind modern cybercrime.
What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing
Nov 13, 2025

What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing

OWASP’s 2025 Top 10 shows how security misconfigurations and software supply chain issues dominate. Here’s how continuous pentesting closes the gap.
1 2 3 4 5