Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Essential Cybersecurity Terms Every Organization Should Know
Mar 03, 2025 Sprocket Security

Essential Cybersecurity Terms Every Organization Should Know

If you’re not in the cybersecurity trenches daily, it can be tough to get a clear understanding of many popular terms used by the professionals testing your organization’s network.
Continuous Penetration Testing: Key Benefits and How It Differs from Traditional Methods
Feb 26, 2025 Casey Cammilleri

Continuous Penetration Testing: Key Benefits and How It Differs from Traditional Methods

You need more value out of your pentests. The traditional point-in-time testing isn't cutting it. Continuous penetration testing brings an innovative methodology that better protects you and your business. This post covers the key benefits that continuous testing provides...
We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned
Oct 15, 2024 Sprocket Security

We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned

We’ve just released our latest report, “Voice of an In-House Pentester,” diving deep into the world of penetration testing. With insights from 200 in-house security practitioners, this report reveals key trends, challenges, and opportunities in the industry.
One Proxy to Rule Them All
Jul 15, 2024 Joseph Morris

One Proxy to Rule Them All

Bypass WAFs with gigaproxy: an HTTP proxy that rotates IPs using mitmproxy, AWS API Gateway, and Lambda. Read the blog to learn more.
How to Prepare for Penetration Testing
Feb 01, 2023 Sprocket Security

How to Prepare for Penetration Testing

Preparing for a penetration test? This checklist will inform you on what to expect and what steps you should take to get the most out of your organization’s upcoming pentest.
Crossing the Log4j Horizon - A Vulnerability With No Return
Jan 10, 2022 Nicholas Anastasi

Crossing the Log4j Horizon - A Vulnerability With No Return

A vulnerability was recently disclosed for the Java logging library, Log4j. The vulnerability is wide-reaching and affects both open-source projects and enterprise software. VMWare announced shortly after the release of the issue that several of their products were affected. A proof of concept has been released for VMWare Horizon instances and allows attackers to execute code as an unauthenticated user...
1 2 3 4 5 »