Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
Why Connected Medical Devices Are Your New Perimeter
Mar 06, 2026

Why Connected Medical Devices Are Your New Perimeter

53% of connected medical devices have critical vulnerabilities. Learn how attackers and exploit IoT blind spots in healthcare networks and how to close them.
Ahead of the Breach – Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting
Mar 05, 2026

Ahead of the Breach – Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting

Daniel Barnes shares stories from his pentesting career and gives advice for up-and-coming offensive security professionals.
What OCR Investigators Look for After a Breach
Mar 04, 2026

What OCR Investigators Look for After a Breach

Learn what HHS OCR investigators look for after a HIPAA breach and how continuous penetration testing builds the audit trail that proves your security programs works.
Vulnerability Hunting a Retired App Part 1 - Auth Bypass
Mar 03, 2026

Vulnerability Hunting a Retired App Part 1 - Auth Bypass

Decompiling a retired .NET application reveals how a single middleware misconfiguration leads to full authentication bypass.
How Continuous Testing Reduces Ransomware Risk in Healthcare
Mar 02, 2026

How Continuous Testing Reduces Ransomware Risk in Healthcare

Healthcare ransomware exploits the gap between tests. See how continuous penetration testing reduces exposure, speeds remediation, and protects patient care.
What a DORA TLPT Assessment Actually Requires
Feb 27, 2026

What a DORA TLPT Assessment Actually Requires

Learn what DORA’s TLPT assessment requires, why most organizations fail on preparation (not vulnerabilities), and how to build a TLPT-ready security program.
2 3 4 5 6