Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

A Love Letter to Nmap
Apr 24, 2025 Topher Lyons

A Love Letter to Nmap

A tool that can scan remote endpoints and provide details on if a host is live and what open ports and services exist on the host. In this blog, I’ll explore some unique and more advanced ways to use Nmap that will make you fall even more in love with the tool.
Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025 Sprocket Security

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
Continuous Penetration Testing vs. Automated Scanning: Why the Human Element Still Matters
Apr 17, 2025 Lindsay Drozdik

Continuous Penetration Testing vs. Automated Scanning: Why the Human Element Still Matters

Automation is great at scanning for vulnerabilities. But supplementing automation alongside human testers actually strengthens your security posture.
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025 Sprocket Security

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
Vulnerability Assessment Process and 5 Critical Best Practices
Apr 02, 2025 Sprocket Security

Vulnerability Assessment Process and 5 Critical Best Practices

A vulnerability assessment identifies and evaluates potential security weaknesses in an organization's systems.
A Vulnerability Hunter's View of Next.js (CVE-2025-29927) Exploit Validation
Mar 27, 2025 Nick Aures

A Vulnerability Hunter's View of Next.js (CVE-2025-29927) Exploit Validation

Explore a security expert's take on validating the Next.js CVE-2025-29927 exploit, its impact, and techniques for assessing and mitigating the risk.
« 1 2 3 4 5 »