Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - What Should You Ask Before Choosing an Offensive Security Platform?
Aug 05, 2025 Sprocket Security

Ahead of the Breach - What Should You Ask Before Choosing an Offensive Security Platform?

In this episode, Casey addresses the questions you should ask before choosing an offensive security platform.
Gear Up with Sprocket: Auto Add Websites
Jul 31, 2025 Topher Lyons

Gear Up with Sprocket: Auto Add Websites

Discover how Sprocket Security’s Auto Add Websites feature is automatically detecting and testing new assets.
Ahead of the Breach - Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show
Jul 30, 2025 Sprocket Security

Ahead of the Breach - Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show

Phillip Wylie, Penetration Tester & Podcast Host of The Phillip Wylie Show, shares why annual penetration testing creates dangerous gaps that threat actors are increasingly exploiting through non-traditional attack vectors like IoT devices.
Stop Waiting, Start Securing: How Strategic Pentesting Accelerates Your Decisions
Jul 29, 2025 Topher Lyons

Stop Waiting, Start Securing: How Strategic Pentesting Accelerates Your Decisions

Discover how strategic pentesting goes beyond traditional assessments to give you actionable insights, reduce uncertainty, and accelerate security decisions. Stop waiting—start securing.
A Primer on Insecure Reflection Practices in Java and C# Applications
Jul 23, 2025 Ron Edgerson

A Primer on Insecure Reflection Practices in Java and C# Applications

Explore common pitfalls in Java and C# reflection practices—understand how insecure use of reflection can expose applications to vulnerabilities like code injection, unauthorized access, and bypassed security controls, and learn key strategies to harden your code.
Ahead of the Breach - What Tools Do You Need for an Offensive Security Stack?
Jul 22, 2025 Sprocket Security

Ahead of the Breach - What Tools Do You Need for an Offensive Security Stack?

In this episode, Casey addresses the tools needed for an offensive security stack.
1 2 3 4 5 »