Testing Lab
Resources Blog

Testing Lab

Keep up to date with the latest offensive security news, knowledge, and resources.
Tenant Enumeration is Back
Dec 10, 2025

Tenant Enumeration is Back

Microsoft's soft patch didn't kill tenant enumeration. Attackers have new ways to map cloud infrastructure. Learn how modern Azure and Microsoft 365 enumeration techniques work, why they're back, and what defenders should do next.
Emerging React & Next.js Vulnerabilities: What We Know About CVE-2025-55182 and CVE-2025-66478
Dec 05, 2025

Emerging React & Next.js Vulnerabilities: What We Know About CVE-2025-55182 and CVE-2025-66478

Emerging React and Next.js vulnerabilities (CVE-2025-55182, CVE-2025-66478): what Sprocket Security is seeing, current detection coverage, and guidance for teams.
What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing
Nov 13, 2025

What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing

OWASP’s 2025 Top 10 shows how security misconfigurations and software supply chain issues dominate. Here’s how continuous pentesting closes the gap.
A Day in the Life of a Vulnerability Researcher — LADSPA
Oct 07, 2025

A Day in the Life of a Vulnerability Researcher — LADSPA

Follow a vulnerability researcher’s deep dive into FFmpeg’s LADSPA plugin loader and the discovery of CVE-2025-60616 — a logic flaw in how environment variables are trusted. Learn how this vulnerability enables code execution, why fuzzing missed it, and how proper validation and process isolation can prevent similar exploits.
From Threat Volume to Real-World Exposure: What the 2025 Comcast Cybersecurity Threat Report Tells Us
Oct 03, 2025

From Threat Volume to Real-World Exposure: What the 2025 Comcast Cybersecurity Threat Report Tells Us

Comcast Business Cybersecurity Threat Report analyzed events, revealing how attackers are shifting tactics and accelerating the pace at which exposures become exploitable. We will expand on four of the threats that keep showing up in breach postmortems, how they work in reality, and what organizations should do about them.
Weird Ways to DA
Sep 11, 2025

Weird Ways to DA

Sprocket Security's Director of Technical Operations reveals how Domain Admin access was gained through overlooked misconfigurations and intricate attack paths, with both insight and humor.
1 2 3 4 5