Sprocket Security | Blogs

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

How Spear Phishing Attacks Work and 8 Ways to Prevent Them
May 01, 2025 Sprocket Security

How Spear Phishing Attacks Work and 8 Ways to Prevent Them

Spear phishing is a targeted email attack that appears personalized and legitimate to an individual.
What It Really Means to Be a Hacker: Lessons from 10 Years in Offensive Security
Apr 29, 2025 Nate Fair

What It Really Means to Be a Hacker: Lessons from 10 Years in Offensive Security

What being a hacker really means—no title required. After a decade in offensive security, Nate Fair shares honest lessons on hacking.
A Love Letter to Nmap
Apr 24, 2025 Topher Lyons

A Love Letter to Nmap

A tool that can scan remote endpoints and provide details on if a host is live and what open ports and services exist on the host. In this blog, I’ll explore some unique and more advanced ways to use Nmap that will make you fall even more in love with the tool.
Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025 Sprocket Security

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
Continuous Penetration Testing vs. Automated Scanning: Why the Human Element Still Matters
Apr 17, 2025 Lindsay Drozdik

Continuous Penetration Testing vs. Automated Scanning: Why the Human Element Still Matters

Automation is great at scanning for vulnerabilities. But supplementing automation alongside human testers actually strengthens your security posture.
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025 Sprocket Security

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
« 1 2 3 4 5 »