Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
That "Windows Update" Could Be Stealing Your Passwords
Apr 10, 2026

That "Windows Update" Could Be Stealing Your Passwords

Attackers are using a fake Microsoft support page to deliver password-stealing malware disguised as a Windows update and antivirus tools missed it entirely. Learn how the attack works and what your team can do to stay protected.
Ahead of the Breach – Andy Grant on Offensive Intuition and Letting Hackers Hunt
Apr 09, 2026

Ahead of the Breach – Andy Grant on Offensive Intuition and Letting Hackers Hunt

Andy Grant explores what happens when you remove time-boxes, checklists, and rigid scope from offensive security and trust skilled engineers to follow their intuition.
Continuous PTaaS: What It Is, Why It Matters, and What to Look For
Apr 08, 2026

Continuous PTaaS: What It Is, Why It Matters, and What to Look For

PTaaS improved how testing is delivered. Continuous PTaaS improves security outcomes. Learn what your program needs to actually reduce risk over time.
Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed
Mar 30, 2026

The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed

Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
Penetration Testing Strategies for Legacy Healthcare Systems
Mar 26, 2026

Penetration Testing Strategies for Legacy Healthcare Systems

Legacy healthcare systems can’t be patched but they can’t be ignored. Learn how to pentest around clinical assets without disrupting patient care.
1 2 3 4 5