Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed
Mar 30, 2026

The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed

Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
Popping Printers: How Your MFPs Are Handing Attackers Domain Admin
Mar 23, 2026

Popping Printers: How Your MFPs Are Handing Attackers Domain Admin

Multifunction printers silently store domain credentials, expose unauthenticated management interfaces, and sit on flat networks. Learn how attackers exploit MFPs to achieve domain admin in minutes.
Starting Strong: Successful Onboarding with Sprocket Security
Mar 19, 2026

Starting Strong: Successful Onboarding with Sprocket Security

The fastest path from kickoff to testing starts with alignment, preparation, and the right people in the room.
CypherCon 2026: Where Hacker Culture and Security Innovation Meet
Mar 17, 2026

CypherCon 2026: Where Hacker Culture and Security Innovation Meet

Sprocket Security is heading to CypherCon 2026 in Milwaukee to connect with the hacker community, explore cutting-edge security research, and discuss how continuous offensive security is reshaping how organizations validate risk.
Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs
Mar 10, 2026

Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs

Understanding how SiteGround’s proof-of-work CAPTCHA silently disrupts automated WordPress security scans and how to work around it.
1 2 3 4 5