Research
Resources Blog

Research

Keep up to date with the latest offensive security news, knowledge, and resources.
Hook, Line, and Server
Apr 23, 2026

Hook, Line, and Server

MFA doesn't stop session cookie replay. Endpoint detection doesn't catch fileless malware without behavioral analysis. Here's the full post-phishing kill chain and what actually stops it.
Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed
Mar 30, 2026

The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed

Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
LLMs Don't Follow Rules – They Follow Context
Feb 24, 2026

LLMs Don't Follow Rules – They Follow Context

LLM behavior isn't governed by a rulebook — it emerges from context, shaped by a stack of training, fine-tuning, and runtime instructions. Understanding this explains why the same model gives radically different responses to functionally identical requests.
The Cyber Threats That Will Define 2026 (And Why Point-in-Time Testing Keeps Missing Them)
Jan 20, 2026

The Cyber Threats That Will Define 2026 (And Why Point-in-Time Testing Keeps Missing Them)

Security risks for 2026 aren’t new threats. They’re missing exposure. Learn what attackers exploit today and why traditional pentests fall short.
Emerging WatchGuard Vulnerability: What We Know About CVE-2025-14733
Dec 23, 2025

Emerging WatchGuard Vulnerability: What We Know About CVE-2025-14733

Explore what we know about the emerging WatchGuard CVE-2025-14733 vulnerability — unauthenticated RCE risk, active attacks, affected versions, and response steps.
1 2 3 4