Vulnerability Analysis
Resources Blog

Vulnerability Analysis

Keep up to date with the latest offensive security news, knowledge, and resources.
Top 10 Vulnerability Management Best Practices for 2024
Nov 26, 2024

Top 10 Vulnerability Management Best Practices for 2024

Vulnerability management is the ongoing process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software
7-Stage Vulnerability Management Process and How to Make It Great
Nov 21, 2024

7-Stage Vulnerability Management Process and How to Make It Great

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
Ahead of the Breach - Mike Takahashi, Security Engineering Expert & Leader
Sep 05, 2024

Ahead of the Breach - Mike Takahashi, Security Engineering Expert & Leader

Ahead of the Breach Podcast sits down with Mike Takahashi, Security Engineering Expert & Leader, as he shares his insights into the art of Google Dorking, explaining how targeted search queries can reveal hidden vulnerabilities in web applications.
Pwning SPA’s With Semgrep
May 30, 2024

Pwning SPA’s With Semgrep

Semgrep, or Semantic Grep (For Code) should be a part of your pentesting toolkit. If you think otherwise, read on to see why.
Subdomain Takeovers - It’s Always DNS
Mar 07, 2024

Subdomain Takeovers - It’s Always DNS

In this article, we will look at a few different takeover methods, detail how we find them, show how they are exploited, and the easy solution to fixing this potentially severe vulnerability.
1 2