Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Exploiting N-Day Vulnerabilities at Scale with CPT
Jul 19, 2022 Nate Fair

Exploiting N-Day Vulnerabilities at Scale with CPT

A basic guide on how Sprocket utilizes Continuous Penetration Testing to rapidly identify and exploit vulnerabilities.
VIDEO: How Continuous Penetration Testing Works (the best)
May 03, 2021 Sprocket Security

VIDEO: How Continuous Penetration Testing Works (the best)

Trying to wrap your head around what separates Continuous Penetration Testing from other forms of network security testing? Well, we get it. That’s why we’ve put together this handy little video. Sit back, have a snack and learn how CPT works, why it’s advantageous and how it can help you keep your organization’s network safe.
What Is an Attack Surface... and Why Protect It?
May 03, 2021 Nicholas Anastasi

What Is an Attack Surface... and Why Protect It?

Maybe you’ve heard your IT security team talking about attack surfaces? Or, maybe the term has come up during a virtual conference or in your newsfeed. It’s important to take a step back and understand what an attack surface is and why you need to protect it.
What Vulnerability Scanners Miss... and the Cost
Apr 01, 2021 Sprocket Security

What Vulnerability Scanners Miss... and the Cost

Automated Vulnerability Scanners, on the surface, have a lot of appeal to IT directors. They run in the background and are “always on”. They alert you when you have an issue. But the harsh reality is they provide a false sense of security and leave your network exposed.
How to hunt for SolarWinds Orion usage
Dec 17, 2020 Nicholas Anastasi

How to hunt for SolarWinds Orion usage

Recent reports from FireEye revealed a large-scale campaign to infect company networks using a modified version of the SolarWinds Orion monitoring agent.
Getting started with MITRE CALDERA
Jan 25, 2018 Casey Cammilleri

Getting started with MITRE CALDERA

The MITRE CALDERA project is an automated adversary emulation system. It's primary purpose is to execute a series of operations to help determine if adversarial tactics can be detected in your enterprise environment.
« 2 3 4 5 6 »