Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
Context Is The Attack Surface
Apr 13, 2026

Context Is The Attack Surface

A successful prompt hack looks like your system working correctly for someone else. The mechanism that makes this possible is the same one you’re paying for.
Ahead of the Breach – Andy Grant on Offensive Intuition and Letting Hackers Hunt
Apr 09, 2026

Ahead of the Breach – Andy Grant on Offensive Intuition and Letting Hackers Hunt

Andy Grant explores what happens when you remove time-boxes, checklists, and rigid scope from offensive security and trust skilled engineers to follow their intuition.
Continuous PTaaS: What It Is, Why It Matters, and What to Look For
Apr 08, 2026

Continuous PTaaS: What It Is, Why It Matters, and What to Look For

PTaaS improved how testing is delivered. Continuous PTaaS improves security outcomes. Learn what your program needs to actually reduce risk over time.
Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed
Mar 30, 2026

The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed

Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
Popping Printers: How Your MFPs Are Handing Attackers Domain Admin
Mar 23, 2026

Popping Printers: How Your MFPs Are Handing Attackers Domain Admin

Multifunction printers silently store domain credentials, expose unauthenticated management interfaces, and sit on flat networks. Learn how attackers exploit MFPs to achieve domain admin in minutes.
1 2 3 4 5